Cryptanalysis of EC-RAC, a RFID Identification Protocol
@inproceedings{Bringer2008CryptanalysisOE, title={Cryptanalysis of EC-RAC, a RFID Identification Protocol}, author={J. Bringer and H. Chabanne and T. Icart}, booktitle={CANS}, year={2008} }
At RFID'08, Lee et al. have proposed a RFID scheme based on elliptic curve cryptography. This scheme, called Elliptic Curve Random Access Control (EC-RAC) has been conceived in order to be implemented on an efficient security processor designed for RFID tags. The aim of this scheme is to enable a fast, secure and private identification scheme. Security arguments are given to prove that RFID tags implementing this scheme are neither traceable nor cloneable.
We here show how tags can be… CONTINUE READING
Topics from this paper
94 Citations
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2012
- 6
- PDF
Untraceable RFID authentication protocols: Revision of EC-RAC
- Computer Science
- 2009 IEEE International Conference on RFID
- 2009
- 77
- PDF
On the security of an ECC based RFID authentication protocol
- Computer Science
- 2012 9th International ISC Conference on Information Security and Cryptology
- 2012
- 7
Privacy-Preserving and Undeniable Authentication for Mobile RFID Tags
- Computer Science
- 2019 IEEE 20th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM)
- 2019
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
- Computer Science
- Ad Hoc Networks
- 2014
- 133
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
- Computer Science
- Personal and Ubiquitous Computing
- 2011
- 42
- PDF
Designated Attribute-Based Proofs for RFID Applications
- Computer Science
- RFIDSec
- 2012
- 12
- Highly Influenced
- PDF
A Privacy-preserving RFID Authenticate Protocols against Man-in-the- middle Attacks
- Computer Science
- 2013
- PDF
References
SHOWING 1-10 OF 32 REFERENCES
Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function
- Computer Science
- SCN
- 2008
- 36
- PDF
EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol
- Computer Science
- 2008 IEEE International Conference on RFID
- 2008
- 120
- Highly Influential
- PDF
Privacy and security in library RFID: issues, practices, and architectures
- Computer Science
- CCS '04
- 2004
- 748
- PDF
Group-Based Private Authentication
- Computer Science
- 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
- 2007
- 47
- PDF
On the Fly Authentication and Signature Schemes Based on Groups of Unknown Order
- Mathematics, Computer Science
- Journal of Cryptology
- 2006
- 100
- PDF