International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Privacy-Preserving RFID Systems: Model and Constructions

Authors:
Sébastien Canard
Iwen Coisel
Jonathan Etrog
Marc Girault
Download:
URL: http://eprint.iacr.org/2010/405
Search ePrint
Search Google
Abstract: In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID tags. Such system needs thus to be correct (legitimate tags are accepted) and sound (fake tags are rejected). Moreover, an RFID tag in a privacy-preserving system should be anonymous and untraceable, except for the legitimate reader. We here present the first security model for RFID authentication/identification privacy-preserving systems which is at the same time complete and easy to use. Our correctness property permits to take into account active adversaries. Our soundness property incorporates the case of adversaries realizing relay attacks. Finally, our privacy model includes adversaries with no restrictions on their interactions with the system and moreover takes into account the case of ``future correlations''. We next propose several constructions, based on the work from Vaudenay, proving that (i) our strongest property is at least as strong as those of Vaudenay and (ii) this property is reachable by efficient schemes.
BibTeX
@misc{eprint-2010-23306,
  title={Privacy-Preserving RFID Systems: Model and Constructions},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / RFID systems, soundness, privacy},
  url={http://eprint.iacr.org/2010/405},
  note={full version of the merging of two papers from WLC 2010 and IEEE RFID TA 2010 sebastien.canard@orange-ftgroup.com 14810 received 20 Jul 2010},
  author={Sébastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault},
  year=2010
}