phan4.pdf (194.83 kB)
Privacy analysis of forward and backward untraceable RFID authentication schemes
journal contribution
posted on 2011-03-08, 10:05 authored by Raphael C.-W. Phan, Jiang Wu, Khaled Ouafi, Douglas R. StinsonIn this paper, we analyze the rst known provably secure RFID authentication schemes that are
designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how
to trace tags in the L-K scheme without needing to corrupt tags. We also show that if a standard cryptographic
pseudorandom bit generator (PRBG) is used in the S-M scheme, then the scheme may fail to provide forward
untraceability and backward untraceability. To achieve the desired untraceability features, we show that the S-M
scheme can use a robust PRBG which provides forward security and backward security. We also note that the
backward security is stronger than necessary for the backward untraceability of the S-M scheme.
History
School
- Mechanical, Electrical and Manufacturing Engineering
Citation
PHAN, R.C.-W....et al. 2011. Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, Forthcoming articlePublisher
© SpringerVersion
- AM (Accepted Manuscript)
Publication date
2011Notes
The original publication is available at www.springerlink.com.ISSN
0929-6212;1572-834XPublisher version
Language
- en