Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries

M. Burmester, B. D. Medeiros, Rossana Motta
{"title":"Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries","authors":"M. Burmester, B. D. Medeiros, Rossana Motta","doi":"10.1504/IJACT.2008.021082","DOIUrl":null,"url":null,"abstract":"In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted server. Active adversaries disrupt this synchrony, making a recovery strategy necessary. In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring costs that are not constant with the number of legitimate tags. This article describes an approach based on a lightweight trapdoor one-way function from modular squaring. The solution exploits the fact that synchrony can be recovered even if tags are endowed with only the ability to perform public-key operations, whilst the trusted server is capable of trapdoor computations. The construction is provably secure and generic, transforming any anonymous, challenge-response RFID authentication protocol into another that is robust against active adversaries and supports constant key-lookup cost.","PeriodicalId":350332,"journal":{"name":"Int. J. Appl. Cryptogr.","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"41","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Appl. Cryptogr.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJACT.2008.021082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 41

Abstract

In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted server. Active adversaries disrupt this synchrony, making a recovery strategy necessary. In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring costs that are not constant with the number of legitimate tags. This article describes an approach based on a lightweight trapdoor one-way function from modular squaring. The solution exploits the fact that synchrony can be recovered even if tags are endowed with only the ability to perform public-key operations, whilst the trusted server is capable of trapdoor computations. The construction is provably secure and generic, transforming any anonymous, challenge-response RFID authentication protocol into another that is robust against active adversaries and supports constant key-lookup cost.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
匿名RFID身份验证支持针对活动对手的恒定成本密钥查找
在缺乏充分优化的公钥结构的情况下,射频识别设备(rfid)的匿名身份验证需要标签和可信服务器之间的状态同步。活跃的对手破坏这种同步,使恢复策略成为必要。在一些协议中,标签通过重放以前使用的值来恢复,从而损害其转录本的不可链接性;其他方案要求服务器搜索已发布的密钥集,从而产生与合法标记数量不一致的成本。本文描述了一种基于模块化平方的轻量级活板门单向函数的方法。该解决方案利用了这样一个事实,即即使标记只被赋予执行公钥操作的能力,而受信任的服务器能够进行陷阱门计算,也可以恢复同步。该构造可证明是安全的和通用的,它将任何匿名的挑战响应RFID身份验证协议转换为另一种对主动攻击者具有鲁强性并支持恒定密钥查找成本的协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Dynamic MDS diffusion layers with efficient software implementation Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level Delegation-based conversion from CPA to CCA-secure predicate encryption Preventing fault attacks using fault randomisation with a case study on AES A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1