RFID Systems and Security and Privacy Implications
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The blocker tag: selective blocking of RFID tags for consumer privacy
Proceedings of the 10th ACM conference on Computer and communications security
Challenge-eesponse based RFID authentication protocol for distributed database environment
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Hi-index | 0.00 |
RFID(Radio Frequency Identification) system will play a critical role providing widespread services in a ubiquitous environment. However, widespread use of RFID tags may create new threats to a consumer privacy such as information leakage and traceability. It is difficult to solve the problems because a tag has the limited computing power that lacks of supporting the general encryption. Although the scheme of [2] protects a consumer privacy using an external agent, a tag should perform exponential operation requiring high cost. We propose Self Re-Encryption Protocol(SREP) which provides strong privacy without help of any external agent. SREP is well suitable for low cost RFID systems since it only needs multiplication and exclusive-or operation.