Paper 2010/405

Privacy-Preserving RFID Systems: Model and Constructions

Sébastien Canard, Iwen Coisel, Jonathan Etrog, and Marc Girault

Abstract

In this paper, we study systems where a reader wants to authenticate and identify legitimate RFID tags. Such system needs thus to be correct (legitimate tags are accepted) and sound (fake tags are rejected). Moreover, an RFID tag in a privacy-preserving system should be anonymous and untraceable, except for the legitimate reader. We here present the first security model for RFID authentication/identification privacy-preserving systems which is at the same time complete and easy to use. Our correctness property permits to take into account active adversaries. Our soundness property incorporates the case of adversaries realizing relay attacks. Finally, our privacy model includes adversaries with no restrictions on their interactions with the system and moreover takes into account the case of ``future correlations''. We next propose several constructions, based on the work from Vaudenay, proving that (i) our strongest property is at least as strong as those of Vaudenay and (ii) this property is reachable by efficient schemes.

Metadata
Available format(s)
PDF PS
Category
Cryptographic protocols
Publication info
Published elsewhere. full version of the merging of two papers from WLC 2010 and IEEE RFID TA 2010
Keywords
RFID systemssoundnessprivacy
Contact author(s)
sebastien canard @ orange-ftgroup com
History
2010-07-21: received
Short URL
https://ia.cr/2010/405
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2010/405,
      author = {Sébastien Canard and Iwen Coisel and Jonathan Etrog and Marc Girault},
      title = {Privacy-Preserving {RFID} Systems: Model and Constructions},
      howpublished = {Cryptology {ePrint} Archive, Paper 2010/405},
      year = {2010},
      url = {https://eprint.iacr.org/2010/405}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.