RFID Security: Tradeoffs between Security and Efficiency

@inproceedings{Damgrd2006RFIDST,
  title={RFID Security: Tradeoffs between Security and Efficiency},
  author={Ivan Damg{\aa}rd and Michael \Ostergaard Pedersen},
  booktitle={IACR Cryptology ePrint Archive},
  year={2006}
}
Recently, Juels and Weis defined strong privacy for RFID tags. We add to this definition a completeness and a soundness requirement, i.e., a reader should accept valid tags and only such tags. For the case where tags hold independent keys, we prove a conjecture by Juels and Weis, namely in a strongly private and sound RFID system using only symmetric cryptography, a reader must access virtually all keys in the system when reading a tag. It was already known from work by Molnar et al. that when… CONTINUE READING
Highly Cited
This paper has 72 citations. REVIEW CITATIONS

1 Figure or Table

Topics

Statistics

01020'07'08'09'10'11'12'13'14'15'16'17'18
Citations per Year

72 Citations

Semantic Scholar estimates that this publication has 72 citations based on the available data.

See our FAQ for additional information.