## CryptoDB

### Paper: Strengthening the Tree-Based Hash Protocols against Compromise of some Tags

Authors: Julien Bringer Hervé Chabanne Thomas Icart URL: http://eprint.iacr.org/2007/294 Search ePrint Search Google In 2004, Molnar and Wagner introduced in [6] a very appealing scheme dedicated to the identification of RFID tags. Their protocol relies on a binary tree of secrets which are shared -- for all nodes except the leaves -- amongst the tags. Hence the compromise of one tag also has implications on the other tags with whom it shares keys. We introduce a modification of the initial scheme to allow us to strengthen RFID tags by implementing secrets with Physical Obfuscated Keys (POK). This doing, we augment tags and tree resistance against physical threats.
##### BibTeX
@misc{eprint-2007-13574,
title={Strengthening the Tree-Based Hash Protocols against Compromise of some Tags},
booktitle={IACR Eprint archive},
keywords={cryptographic protocols / RFID tags, Tree-Based Hash Protocol, POK},
url={http://eprint.iacr.org/2007/294},
note={ julien.bringer@sagem.com 13724 received 30 Jul 2007, last revised 30 Jul 2007},
author={Julien Bringer and Hervé Chabanne and Thomas Icart},
year=2007
}