Skip to main content

Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags

  • Conference paper
Embedded and Ubiquitous Computing (EUC 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3207))

Included in the following conference series:

Abstract

A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. Although ID of a RFID tag can be encrypted, it is possible to pursue an object by tracing specific information. Therefore, we discuss the privacy protection using universal re-encryption proposed by Golle, Jakobsson, Juels and Syverson. Since the system does not protect a modification of the information on RFID tags, it can be exploited by an attacker. Therefore we point out two attacks using modification of the information on RFID tags. Moreover, we offer two proposed schemes for addressing the problem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Juels, A.: Privacy and Authentication in Low-Cost RFID Tags. In submission (2003), http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/index.html

  2. Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTO-WH-014, AutoID Center, MIT (2002)

    Google Scholar 

  4. Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. Security Bytes 6(1) (2003)

    Google Scholar 

  5. Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: First International Conference on Security in Pervasive Computing (2003) (to appear), http://citeseer.nj.nec.com/weis03security.html

  6. Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: submission (2003), http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/index.html

  7. Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. To be presented at RSA (2004), Cryptographer’s Track, http://crypto.stanford.edu/~pgolle/

  8. Finkerseller. K.: RFID Handbook, Carl Hanser Verlag Munchen (September 2002)

    Google Scholar 

  9. McCullagh, D.: RFID tags: Big Brother in small pachkages. CNet, January 13 (2003), Available at http://news.com.com/2010-1069-980325.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Saito, J., Ryou, JC., Sakurai, K. (2004). Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_84

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30121-9_84

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22906-3

  • Online ISBN: 978-3-540-30121-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics