Skip to Main content Skip to Navigation
New interface
Conference papers

Modeling Privacy for Off-Line RFID Systems

Abstract : This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only capable of compromising tags, but also of compromising readers. This more properly models large scale deployment of RFID technology such as in public transport ticketing systems and supply-chain management systems. In this model we define notions of security (only legitimate tags can authenticate) and of privacy (no adversary is capable of tracking legitimate tags). We show that privacy is always lost at the moment that a reader is compromised and we develop notions of forward and backward privacy with respect to reader corruption. This models the property that tags cannot be traced, under mild additional assumptions, for the time slots before and after reader corruption. We exhibit two protocols that only use hashing that achieve these security and privacy notions and give proofs in the random oracle model.
Document type :
Conference papers
Complete list of metadata

Cited literature [10 references]  Display  Hide  Download
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Thursday, August 14, 2014 - 6:26:00 PM
Last modification on : Thursday, December 1, 2022 - 2:02:08 PM
Long-term archiving on: : Thursday, November 27, 2014 - 1:42:12 AM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Flavio D. Garcia, Peter Rossum. Modeling Privacy for Off-Line RFID Systems. 9th IFIP WG 8.8/11.2 International Conference on Smart Card Research and Advanced Applications (CARDIS), Apr 2010, Passau, Germany. pp.194-208, ⟨10.1007/978-3-642-12510-2_14⟩. ⟨hal-01056106⟩



Record views


Files downloads