Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols
- 1 August 2006
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 2006, 1-9
- https://doi.org/10.1109/seccomw.2006.359563
Abstract
This paper examines two unlinkably anonymous, simple RFID identification protocols that require only the ability to evaluate hash functions and generate random values, and that are provably secure against Byzantine adversaries. The main contribution is a universally composable security model tuned for RFlD applications. By making specific setup, communication, and concurrency assumptions that are realistic in the RFID application setting, we arrive at a model that guarantees strong security and availability properties, while still permitting the design of practical RFID protocols. We show that two protocols are provably secure within the new security model. Our proofs do not employ random oracles - the protocols are shown to be secure in the standard model under the assumption of existence of pseudo-random function familiesKeywords
This publication has 17 references indexed in Scilit:
- Authenticating Pervasive Devices with Human ProtocolsLecture Notes in Computer Science, 2005
- Initiator-Resilient Universally Composable Key ExchangeLecture Notes in Computer Science, 2003
- Universally Composable Notions of Key Exchange and Secure ChannelsLecture Notes in Computer Science, 2002
- Secure Human Identification ProtocolsLecture Notes in Computer Science, 2001
- Universally Composable CommitmentsLecture Notes in Computer Science, 2001
- Multiparty Computation with Faulty MajorityPublished by Springer Nature ,2001
- Foundations of Secure Interactive ComputingPublished by Springer Nature ,2001
- Security and Composition of Multiparty Cryptographic ProtocolsJournal of Cryptology, 2000
- Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minorityJournal of Cryptology, 1991
- How to play ANY mental gamePublished by Association for Computing Machinery (ACM) ,1987