We also introduce new, provably secure, and highly practical protocols for anonymous authentication and key-exchange by RFID devices. The new protocols are lightweight, requiring only a pseudo-random bit generator. The new protocols satisfy forward-secure anonymity, authenticity, and availability requirements in the Universal Composability model. The proof exploits pseudo-randomness in the standard model.
Category / Keywords: cryptographic protocols / Publication Info: RFID Authentication Protocols, key exchange, anonymity, forward security, universal composability Date: received 27 Nov 2006, last revised 5 Dec 2006 Contact author: levan at cs fsu edu Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation Note: Modified section 7.
Version: 20061205:234449 (All versions of this report) Discussion forum: Show discussion | Start new discussion