Abstract

Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zeroknowledge based tag authentication protocols and prove that they offer wide-strong privacy. Disciplines Engineering | Science and Technology Studies Publication Details Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V. (2013). On RFID authentication protocols with widestrong privacy. Cryptology and Information Security Series, 11 3-16. This journal article is available at Research Online: http://ro.uow.edu.au/eispapers/1817 On RFID Authentication Protocols with Wide-Strong Privacy 1 Nan Li , Yi Mu , Willy Susilo , Fuchun Guo a and Vijay Varadharajan b a Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia e-mail: {nl864,ymu,wsusilo,fuchun}@uow.edu.au b Information and Networked Systems Security Research, Department of Computing, Faculty of Science, Macquarie University, Sydney,Australia e-mail: vijay.varadharajan@mq.edu.au Abstract. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy. Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.