Privacy-Preserving Mutual Authentication in RFID with Designated Readers

被引:4
作者
Guo, Fuchun [1 ]
Mu, Yi [1 ]
Susilo, Willy [1 ]
Varadharajan, Vijay [2 ]
机构
[1] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[2] Macquarie Univ, Dept Comp, Sydney, NSW, Australia
关键词
RFID security; Authentication; Privacy; IDENTITY-BASED ENCRYPTION; CONSTANT SIZE CIPHERTEXTS; SECURITY;
D O I
10.1007/s11277-017-4430-x
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We study privacy-preserving mutual authentication in radio-frequency identification systems with designated readers (PP-MADR in short). In PP-MADR, each tag has its designated-reader group instead of all readers, and only tags and their designated readers can authenticate each other. Other readers and adversaries cannot trace tags or know their designated readers. The most challenging task of constructing such a PP-MADR protocol is the verification of reader designation without compromising tag privacy. We found that traditional solutions are impractical due to linear storage growth on tags, linear computation growth on tags, or requiring new key generations for designated readers. In this paper, we show how to construct such an efficient PP-MADR protocol. In our protocol, each tag stores constant-size secret state and performs constant-time computation for mutual authentication. When a tag is created, the server does not generate new private keys for designated readers. Our protocol captures the strong privacy property, where tags cannot be traced and designated readers cannot be distinguished, even if tags are corrupted by adversaries.
引用
收藏
页码:4819 / 4845
页数:27
相关论文
共 44 条
[1]  
[Anonymous], 2008, P 2008 ACM S INFORM
[2]  
Armknecht F, 2010, LECT NOTES COMPUT SC, V6123, P493, DOI 10.1007/978-3-642-13708-2_29
[3]  
Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
[4]  
Berbain C, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P43
[5]  
Billet O, 2010, LECT NOTES COMPUT SC, V6147, P55, DOI 10.1007/978-3-642-13858-4_4
[6]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[7]   Short signatures from the Weil pairing [J].
Boneh, D ;
Lynn, B ;
Shacham, H .
JOURNAL OF CRYPTOLOGY, 2004, 17 (04) :297-319
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]  
Bringer J, 2008, LECT NOTES COMPUT SC, V5339, P149, DOI 10.1007/978-3-540-89641-8_11
[10]  
Canard S., 2008, P RFIDSEC 08