Presentation | 2014-07-03 A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack Daisuke MORIYAMA, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Yoking-proof in a Radio Frequency Identification (RFID) system provides the evidence that two RFID tags are simultaneously scanned by the RFID reader. Though there are numerous yoking-proof protocols, vulnerabilities related to security and privacy are found in many prior works. We introduce a new security definition that covers the man-in-the-middle (MIM) attack, and a privacy definition based on an indistinguishability framework. We also provide a simple construction of a provably secure offline yoking-proof protocol based on the pseudorandom function. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | RFID authentication / yoking-proof / provable security |
Paper # | ISEC2014-12,SITE2014-7,ICSS2014-16,EMM2014-12 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2014/6/26(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A privacy-preserving RFID Yoking-Proof Protocol provably secure against man-in-the-middle attack |
Sub Title (in English) | |
Keyword(1) | RFID authentication |
Keyword(2) | yoking-proof |
Keyword(3) | provable security |
1st Author's Name | Daisuke MORIYAMA |
1st Author's Affiliation | National Institute of Information and Communications Technology() |
Date | 2014-07-03 |
Paper # | ISEC2014-12,SITE2014-7,ICSS2014-16,EMM2014-12 |
Volume (vol) | vol.114 |
Number (no) | 115 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |