TY - CHAP
T1 - On RFID authentication protocols with wide-strong privacy
AU - Li, Nan
AU - Mu, Yi
AU - Susilo, Willy
AU - Guo, Fuchun
AU - Varadharajan, Vijay
PY - 2013/11
Y1 - 2013/11
N2 - Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.
AB - Radio frequency identification (RFID) tag privacy is an important issue to RFID security. To date, there have been several attempts to achieve the wide-strong privacy by using zero-knowledge protocols. In this paper, we launch an attack on the recent zero-knowledge based identification protocol for RFID, which was claimed to capture wide-strong privacy, and show that this protocol is flawed. Subsequently, we propose two zero-knowledge based tag authentication protocols and prove that they offer wide-strong privacy.
UR - http://www.scopus.com/inward/record.url?scp=84888124294&partnerID=8YFLogxK
U2 - 10.3233/978-1-61499-328-5-3
DO - 10.3233/978-1-61499-328-5-3
M3 - Chapter
AN - SCOPUS:84888124294
SN - 9781614993278
T3 - Cryptology and Information Security Series
SP - 3
EP - 16
BT - Radio Frequency Identification System Security
A2 - Ma, C.
A2 - Weng, J.
PB - IOS Press
CY - Amsterdam
T2 - Workshop on Radio Frequency Identification/Internet of Things Security
Y2 - 27 November 2013 through 27 November 2013
ER -