Privacy-Preserving Mutual Authentication in RFID with Designated Readers

  title={Privacy-Preserving Mutual Authentication in RFID with Designated Readers},
  author={Fuchun Guo and Yi Mu and Willy Susilo and Vijay Varadharajan},
  journal={Wireless Personal Communications},
We study privacy-preserving mutual authentication in radio-frequency identification systems with designated readers (PP-MADR in short). In PP-MADR, each tag has its designated-reader group instead of all readers, and only tags and their designated readers can authenticate each other. Other readers and adversaries cannot trace tags or know their designated readers. The most challenging task of constructing such a PP-MADR protocol is the verification of reader designation without compromising tag… Expand
2 Citations
Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains
This paper proposes a robust ultra-lightweight mutual authentication RFID protocol that works together with a decentralized database to create a secure blockchain-enabled supply chain management system. Expand
Efficient oblivious transfer with membership verification
A new concept of oblivious transfer with membership verification that allows any legitimate group users to obtain services from a service provider in an oblivious manner is introduced and it is proved that the two oblivious transferwith membership verification schemes can achieve receiver's privacy and sender's privacy under a half-simulation model. Expand


Privacy-Preserving Authorized RFID Authentication Protocols
This paper proposes a novel concept of authorized RFID authentication that allows the tag to be merely identifiable by an authorized reader and the server cannot reveal the tag during the reader-server interaction. Expand
Privacy-Preserving RFID Systems: Model and Constructions
This work presents the first security model for RFID authentication/identification privacypreserving systems which is at the same time complete and easy to use and includes adversaries with no restrictions on their interactions with the system. Expand
Privacy and security in library RFID: issues, practices, and architectures
Privacy issues related to Radio Frequency Identification in libraries are exposed, current deployments are described, and a simple scheme is given that provides security against a passive eavesdropper using XOR alone, without pseudo-random functions or other heavy crypto operations. Expand
Untraceable RFID authentication protocols: Revision of EC-RAC
This paper first revise the EC-RAC (Elliptic Curve Based Randomized Access Control) protocol and expands it into several authentication protocols that satisfy the basic requirements, which are the system scalability, un-traceability and security against cloning attacks and replay attacks, but each protocol has different security properties. Expand
Data Synchronization in Privacy-Preserving RFID Authentication Schemes
This paper introduces a new characterization, called synchronizability, of RFID schemes, which allows to establish a relevant model, evaluate existing schemes in this model and point out their deficiencies; and present a new scheme with all desired features. Expand
Mutual authentication in RFID: security and privacy
It is proved that secure protocols cannot protect privacy unless they assume tags have a temporary memory which vanishes by itself, so a few basic protocols are enriched to get secure mutual authentication RFID protocols which achieve weak privacy based on pseudorandom functions only. Expand
On RFID Privacy with Mutual Authentication and Tag Corruption
The model proposed by Paise and Vaudenay is revisited and it is shown that the strongest privacy notion (narrow-strong privacy) cannot be achieved simultaneously with reader authentication even if the adversary is not capable of corrupting a tag during the protocol execution. Expand
An efficient forward private RFID protocol
This paper proposes a novel forward private authentication scheme built upon less computationally expensive cryptographic ingredients, namely pseudo-random generators and universal hash functions instead of one way hash functions and provides security proofs of the construction in the standard model instead of the random oracle model. Expand
An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
The protocol is secure under standard assumptions, builds over a recent work, extends it to achieve mutual authentication, and improves it by introducing a resynchronization mechanism between tag and reader. Expand
Zero-Knowledge Authentication Protocol Based on Alternative Mode in RFID Systems
This paper indicates that ZKAP owns no obvious design defects theoretically and is robust enough to resist major attacks (e.g., forgery, replay, Man-in-the-Middle, and tracking). Expand