Advertisement

Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems

  • Hafsa Assidi
  • Edoukou Berenger Ayebie
  • El Mamoun Souidi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10779)

Abstract

RFID technology is becoming more useful and it is applied in various domains such as inventory management, supply chain, logistics, control access, e-passport, e-health and many other applications. Proposing an authentication protocol for RFID systems must find a compromise between the limitation of resources and the security requirements. In this paper, we propose two Zero-Knowledge mutual authentication protocols for the first time based on error correcting codes which are supposed to be resistant to quantum computer. Our proposed schemes have many advantages in terms of the approach used in the definition of the protocols and in terms of security properties and performances. Besides all the standard security requirements that our schemes fulfill, an adversary who can compromise the Reader cannot get the identifier of the Tag. We achieve this by using a Zero-Knowledge identification protocol.

Keywords

RFID Authentication Code-based cryptography Zero-Knowledge Security 

References

  1. 1.
    Chen, C.L., Lai, Y.L., Chen, C.C., Deng, Y.Y., Hwang, Y.C.: RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards. Int. J. Netw. Secur. 13, 41–48 (2011)Google Scholar
  2. 2.
    Khedr, W.: On the security of moessner’s and khan’s authentication scheme for passive EPCglobal C1G2 RFID Zero-Knowledges. Int. J. Netw. Secur. 16(5), 369–375 (2014)Google Scholar
  3. 3.
    Naveed, M., Habib, W., Masud, U., Ullah, U., Ahmad, G.: Reliable and low cost RFID based authentication system for large scale deployment. Int. J. Netw. Secur. 14, 173–179 (2012)Google Scholar
  4. 4.
    Wei, C.H., Hwang, M.S., Chin, A.Y.H.: An authentication protocol for low-cost RFID Tags. Int. J. Mob. Commun. 9(2), 208–223 (2011)CrossRefGoogle Scholar
  5. 5.
    Chien, H.Y.: Secure access control schemes for RFID systems with anonymity. In: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, pp. 96–100 (2006)Google Scholar
  6. 6.
    Cao, T., Shen, P.: Cryptanalysis of two RFID authentication protocols. Int. J. Netw. Secur. 9, 95–100 (2009)Google Scholar
  7. 7.
    Chikouche, N., Cherif, F., Cayrel, P.-L., Benmohammed, M.: Weaknesses in two RFID authentication protocols. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E.M. (eds.) C2SI 2015. LNCS, vol. 9084, pp. 162–172. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-18681-8_13 Google Scholar
  8. 8.
    Cui, Y., Kobara, K., Matsuura, K., Imai, H.: Lightweight asymmetric privacy-preserving authentication protocols secure against active attack. In: Proceedings of the Fifth Annual IEEE International Conference (PerComW 2007), White Plains, NY, USA, pp. 223–228 (2007)Google Scholar
  9. 9.
    Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for lowcost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)CrossRefGoogle Scholar
  10. 10.
    Malek, B., Miri, A.: Lightweight mutual RFID authentication. In: Proceedings of IEEE International Conference on Communications, Ottawa, ON, Canada, pp. 868–872 (2012)Google Scholar
  11. 11.
    Li, Z., Zhang, R., Yang, Y., Li, Z.: A provable secure mutual RFID authentication protocol based on error-correct code. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, pp. 73–78. IEEE (2014)Google Scholar
  12. 12.
    Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: A secure code-based authentication scheme for RFID systems. Int. J. Comput. Netw. Inf. Secur. 7, 1–9 (2015)zbMATHGoogle Scholar
  13. 13.
    Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: Improved RFID authentication protocol based on randomized McEliece cryptosystem. Int. J. Netw. Secur. 17, 413–422 (2015)zbMATHGoogle Scholar
  14. 14.
    El Moustaine, E., Laurent, M.: GPS+: a back-end coupons identification for low-cost RFID. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2013, Budapest, Hungary, pp. 73–78 (2013)Google Scholar
  15. 15.
    Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-15497-3_1 CrossRefGoogle Scholar
  16. 16.
    Aguilar Melchor, C., Gaborit, P., Schrek, J.: A new Zero-Knowledge code based identification scheme with reduced communication. In: 2011 IEEE Information Theory Workshop, pp. 648–652. IEEE Press, Paraty (2011)Google Scholar
  17. 17.
    Liu, Z., Zhang, W., Wu, C.: A lightweight code-based authentication protocol for RFID systems. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 114–128. Springer, Heidelberg (2015).  https://doi.org/10.1007/978-3-662-48683-2_11 CrossRefGoogle Scholar
  18. 18.
    Berlekamp, E.R., McEliece, R.J., Van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  19. 19.
    Stern, J.: A method for finding codewords of small weight. In: Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106–113. Springer, Heidelberg (1989).  https://doi.org/10.1007/BFb0019850 CrossRefGoogle Scholar
  20. 20.
    Peeters, R., Hermans, J.: Wide strong private RFID identification based on Zero-Knowledge. IACR Cryptol. ePrint Arch. 2012, 389 (2012)Google Scholar
  21. 21.
    Assidi, H., Ayebie, E.B., Souidi, E.M.: A code-based group signature scheme with shorter public key length. In: ICETE 2016, SECRYPT, vol. 4, pp. 432–439. SciTePress, Lisbon, Portugal, July 2016Google Scholar
  22. 22.
    Ayebie, B.E., Assidi, H., Souidi, E.M.: A new dynamic code-based group signature scheme. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds.) C2SI 2017. LNCS, vol. 10194, pp. 346–364. Springer, Cham (2017).  https://doi.org/10.1007/978-3-319-55589-8_23 CrossRefGoogle Scholar
  23. 23.
    Aguilar Melchor, C., Cayrel, P.-L., Gaborit, P.: A new efficient threshold ring signature scheme based on coding theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 1–16. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-88403-3_1 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Laboratory of Mathematics, Computer Science and Applications, Faculty of SciencesMohammed V University in RabatRabatMorocco

Personalised recommendations