Cryptology ePrint Archive: Report 2019/1214

A New Secure and Efficient Ownership Transfer Protocol based on Quadric Residue and Homomorphic Encryption

Farokhlagha Moazami and Masoumeh Safkhani

Abstract: In systems equipped with radio frequency identification (RFID) technology, several security concerns may arise when the ownership of a tag should be transferred from one owner to another, e.g., the confidentiality of information related to the old owner or the new owner. Therefore, this transfer is usually done via a security protocol called the ownership transfer protocol. If the ownership of several things together transmitted from one owner to another during a single session, the protocol is referred to as the group ownership transfer protocol. Lee et al. recently proposed a new group ownership transfer protocol by using cloud server, as a trusted third-party, and based on homomorphic encryption and quadratic residue. In this paper, at first, we explain some important security attacks against this recently proposed RFID group ownership transfer protocol. The success probability of any attack that is presented in this paper is $1$ and the complexity is just a run of the protocol. Zhu et al. also in order to provide simultaneous transfer of group of tags in multi-owner environment proposed a lightweight anonymous group ownership transfer protocol. In this paper, we show that it suffers from desynchronization attack. The success probability of this attack is "1" and its complexity is only five runs of group ownership transfer protocol. In addition, to overcome the Lee \textit{et al.} protocol security weaknesses, we present a new group ownership transfer protocol which is resistant against all known active and passive attacks, including the attacks presented in this paper. The provided security proof through informal methods and also formal methods such as Barrows-Abadi-Needham logic and Scyther tool show the proposed protocol's security correctness.

Category / Keywords: cryptographic protocols / RFID, Ownership Transfer Protocol, Quadratic Residue, Secret Disclosure Attack, Traceability Attack, Scyther, Barrows-Abadi-Needham

Date: received 16 Oct 2019

Contact author: safkhani at srttu edu,farokhlagha moazami@yahoo com,m safkhani@gmail com

Available format(s): PDF | BibTeX Citation

Version: 20191017:125634 (All versions of this report)

Short URL: ia.cr/2019/1214


[ Cryptology ePrint archive ]