Advertisement

Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System

  • Jeong Su Park
  • Su Mi Lee
  • Eun Young Choi
  • Dong Hoon Lee
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3983)

Abstract

RFID(Radio Frequency Identification) system will play a critical role providing widespread services in a ubiquitous environment. However, widespread use of RFID tags may create new threats to a consumer privacy such as information leakage and traceability. It is difficult to solve the problems because a tag has the limited computing power that lacks of supporting the general encryption. Although the scheme of [2] protects a consumer privacy using an external agent, a tag should perform exponential operation requiring high cost. We propose Self Re-Encryption Protocol(SREP) which provides strong privacy without help of any external agent. SREP is well suitable for low cost RFID systems since it only needs multiplication and exclusive-or operation.

Keywords

Authentication Scheme External Agent Transmitted Message Information Leakage Replay Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  2. 2.
    Saito, J., Ryou, J., Sakurai, K.: Enhancing privacy of universal re-encryption scheme for RFID tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  3. 3.
    Juels, A., Rivest, R.L., Szudlo, M.: The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. ACM CCS, 103–111 (October 2003)Google Scholar
  4. 4.
    Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    mCloak: Personal/corporate management of wireless devices and technology (2003), http://www.mogilecloak.com
  6. 6.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ‘Privacy-Friendly’ Tags. In: RFID Privacy Workshop (November 2003)Google Scholar
  7. 7.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Ubcomp 2004 workshop (September 2004)Google Scholar
  8. 8.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master Thesis, MIT (May 2003)Google Scholar
  10. 10.
    Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  11. 11.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Jeong Su Park
    • 1
  • Su Mi Lee
    • 1
  • Eun Young Choi
    • 1
  • Dong Hoon Lee
    • 1
  1. 1.Center for the Information Security Technologies(CIST)Korea UniversitySeoulKorea

Personalised recommendations