2009
DOI: 10.1145/1513601.1513603
|View full text |Cite
|
Sign up to set email alerts
|

Universally Composable RFID Identification and Authentication Protocols

Abstract: As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple reuse of traditional security/privacy solutions and calls for a new generation of extremely lightweight identification and authentication protocols.This article describes a universally composable security framework designed especially for RFID applications. We adopt RFID-specific setup, communication, and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
62
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(64 citation statements)
references
References 41 publications
(42 reference statements)
1
62
0
Order By: Relevance
“…EU-CMA security prevents successful prediction of signatures in instance 2 I from signatures in instance 1 I and as digital signatures are the only cryptographic mappings, instance 2 I is unpredictable from instance 1 I and vice versa. In spite of this (weak) unpredictability, the two instances are not computationally independent, which were the case if 1 I and 2 I would use (statistically) independent signature keys. Indeed, a distinguishing algorithm being aware of the public verification algorithm could easily distinguish the case of a common key from the one with independent keys.…”
Section: Definition 1 (Computational Independence)mentioning
confidence: 99%
See 3 more Smart Citations
“…EU-CMA security prevents successful prediction of signatures in instance 2 I from signatures in instance 1 I and as digital signatures are the only cryptographic mappings, instance 2 I is unpredictable from instance 1 I and vice versa. In spite of this (weak) unpredictability, the two instances are not computationally independent, which were the case if 1 I and 2 I would use (statistically) independent signature keys. Indeed, a distinguishing algorithm being aware of the public verification algorithm could easily distinguish the case of a common key from the one with independent keys.…”
Section: Definition 1 (Computational Independence)mentioning
confidence: 99%
“…Note EU-CMA security for a primitive f is an example for (weak) unpredictability: we require (weak) unpredictability for any pair of random variables 12 (m , m ) , where random variable 1 m is learned via accessing the corresponding oracle and 2 m is an output of f for a fresh input.…”
Section: Eu-cma Securitymentioning
confidence: 99%
See 2 more Smart Citations
“… Universal Composability (UC) Protocols: O-FRAP Protocol [43], Optimistic Forward Secure RFID Authentication Protocol is the first full-fledged protocol, which is proven secure in a UC-based security framework [44]. The mutual authentication, privacy-preserving, a mechanism to prevent desynchronization of secret key attack, and forward security can be achieved by this protocol.…”
Section: Related Work and Current Countermeasures For Secure Rfidmentioning
confidence: 99%