Privacy and Reader-first Authentication in Vaudenay’s RFID Model with Temporary State Disclosure
Închide
Conţinutul numărului revistei
Articolul precedent
Articolul urmator
232 1
Ultima descărcare din IBN:
2023-02-20 08:38
Căutarea după subiecte
similare conform CZU
004.056.55 (49)
Știința și tehnologia calculatoarelor. Calculatoare. Procesarea datelor (4169)
SM ISO690:2012
ȚIPLEA, Ferucio Laurențiu, HRISTEA, Cristian, BULAI, Rodica. Privacy and Reader-first Authentication in Vaudenay’s RFID Model with Temporary State Disclosure. In: Computer Science Journal of Moldova, 2022, nr. 3(90), pp. 335-359. ISSN 1561-4042. DOI: https://doi.org/10.56415/csjm.v30.18
EXPORT metadate:
Google Scholar
Crossref
CERIF

DataCite
Dublin Core
Computer Science Journal of Moldova
Numărul 3(90) / 2022 / ISSN 1561-4042 /ISSNe 2587-4330

Privacy and Reader-first Authentication in Vaudenay’s RFID Model with Temporary State Disclosure

DOI:https://doi.org/10.56415/csjm.v30.18
CZU: 004.056.55
MSC 2010: 94A60, 94A62.

Pag. 335-359

Țiplea Ferucio Laurențiu1, Hristea Cristian2, Bulai Rodica3
 
1 Alexandru Ioan Cuza University of Iaşi,
2 "Simion Stoilow" Institute of Mathematics of Romanian Academy,
3 Technical University of Moldova
 
 
Disponibil în IBN: 20 decembrie 2022


Rezumat

Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. This paper proposes two practical RFID schemes that meet these requirements. They differ from other similar schemes in that they provide reader-first authentication. Regarding privacy, our first scheme achieves destructive privacy, while the second one – narrow destructive privacy in Vaudenay’s model with temporary state disclosure. To achieve these privacy levels, we use Physically Unclonable Functions (PUFs) to assure that the internal secret of the tag remains hidden from an adversary with invasive capabilities. Both of our schemes avoid the use of random generators on tags. Detailed security and privacy proofs are provided

Cuvinte-cheie
Computer security, authentication, Privacy, cryptography, PUF, RFID system