Cryptanalysis of EC-RAC, a RFID Identification Protocol

  title={Cryptanalysis of EC-RAC, a RFID Identification Protocol},
  author={J. Bringer and H. Chabanne and T. Icart},
  • J. Bringer, H. Chabanne, T. Icart
  • Published in CANS 2008
  • Mathematics, Computer Science
  • At RFID'08, Lee et al. have proposed a RFID scheme based on elliptic curve cryptography. This scheme, called Elliptic Curve Random Access Control (EC-RAC) has been conceived in order to be implemented on an efficient security processor designed for RFID tags. The aim of this scheme is to enable a fast, secure and private identification scheme. Security arguments are given to prove that RFID tags implementing this scheme are neither traceable nor cloneable. We here show how tags can be… CONTINUE READING
    94 Citations
    Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
    • 6
    • PDF
    Untraceable RFID authentication protocols: Revision of EC-RAC
    • 77
    • PDF
    On the security of an ECC based RFID authentication protocol
    • 7
    Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags
    • J. Wei, Nan Li
    • Computer Science
    • 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
    • 2019
    Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
    • 42
    • PDF
    Privacy-Preserving Authorized RFID Authentication Protocols
    • 13
    Designated Attribute-Based Proofs for RFID Applications
    • 12
    • Highly Influenced
    • PDF


    Privacy of Recent RFID Authentication Protocols
    • 100
    • PDF
    Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
    • 36
    • PDF
    EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
    • 120
    • Highly Influential
    • PDF
    Traceable Privacy of Recent Provably-Secure RFID Protocols
    • 65
    • PDF
    Privacy and security in library RFID: issues, practices, and architectures
    • 748
    • PDF
    Group-Based Private Authentication
    • 47
    • PDF
    Strong Authentication for RFID Systems Using the AES Algorithm
    • 808
    • PDF
    On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
    • 100
    • PDF
    On Privacy Models for RFID
    • 402
    • Highly Influential
    • PDF
    Reducing Time Complexity in RFID Systems
    • 246
    • PDF