Presentation 2014-07-03
A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack
Daisuke MORIYAMA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneously scanned by the RFID reader. Though there are numerous yoking-proof protocols, vulnerabilities related to security and privacy are found in many prior works. We introduce a new security definition that covers the man-in-the-middle (MIM) attack, and a privacy definition based on an indistinguishability framework. We also provide a simple construction of a provably secure offline yoking-proof protocol based on the pseudorandom function.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) RFID authentication / yoking-proof / provable security
Paper # ISEC2014-12,SITE2014-7,ICSS2014-16,EMM2014-12
Date of Issue

Conference Information
Committee ISEC
Conference Date 2014/6/26(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack
Sub Title (in English)
Keyword(1) RFID authentication
Keyword(2) yoking-proof
Keyword(3) provable security
1st Author's Name Daisuke MORIYAMA
1st Author's Affiliation National Institute of Information and Communications Technology()
Date 2014-07-03
Paper # ISEC2014-12,SITE2014-7,ICSS2014-16,EMM2014-12
Volume (vol) vol.114
Number (no) 115
Page pp.pp.-
#Pages 8
Date of Issue