International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Strengthening the Tree-Based Hash Protocols against Compromise of some Tags

Authors:
Julien Bringer
Hervé Chabanne
Thomas Icart
Download:
URL: http://eprint.iacr.org/2007/294
Search ePrint
Search Google
Abstract: In 2004, Molnar and Wagner introduced in [6] a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared -- for all nodes except the leaves -- amongst the tags. Hence the compromise of one tag also has implications on the other tags with whom it shares keys. We introduce a modification of the initial scheme to allow us to strengthen RFID tags by implementing secrets with Physical Obfuscated Keys (POK). This doing, we augment tags and tree resistance against physical threats.
BibTeX
@misc{eprint-2007-13574,
  title={Strengthening the Tree-Based Hash Protocols against Compromise of some Tags},
  booktitle={IACR Eprint archive},
  keywords={cryptographic protocols / RFID tags, Tree-Based Hash Protocol, POK},
  url={http://eprint.iacr.org/2007/294},
  note={ julien.bringer@sagem.com 13724 received 30 Jul 2007, last revised 30 Jul 2007},
  author={Julien Bringer and Hervé Chabanne and Thomas Icart},
  year=2007
}