TY - GEN
T1 - A secure RFID protocol based on insubvertible encryption using guardian proxy
AU - Osaka, Kyosuke
AU - Chang, Shuang
AU - Takagi, Tsuyoshi
AU - Yamazaki, Kenichi
AU - Takahashi, Osamu
PY - 2008
Y1 - 2008
N2 - Radio frequency identification (RFID) has been widely deployed for manufacturing, supply chain management, etc. Unfortunately, RFID may cause privacy and security problems. To solve these problems, researchers have studied extensively on RFID security systems. Ateniese et al. proposed an RFID protocol using insubvertible encryption based on the universal re-encryption. Although this protocol achieves the integrity of ciphertexts randomized by authorized users, it still leaves security problems. In this paper, we propose a secure RFID protocol based on insubvertible encryption involving guardian proxy. The guardian proxy is a personal RFID-privacy device which may be integrated into cellular phones or PDAs. By introducing the guardian proxy and other basic cryptographic primitives into RFID systems, our protocol is secure against the tag spoofing and swapping attacks. Moreover, our protocol enables ownership transfer.
AB - Radio frequency identification (RFID) has been widely deployed for manufacturing, supply chain management, etc. Unfortunately, RFID may cause privacy and security problems. To solve these problems, researchers have studied extensively on RFID security systems. Ateniese et al. proposed an RFID protocol using insubvertible encryption based on the universal re-encryption. Although this protocol achieves the integrity of ciphertexts randomized by authorized users, it still leaves security problems. In this paper, we propose a secure RFID protocol based on insubvertible encryption involving guardian proxy. The guardian proxy is a personal RFID-privacy device which may be integrated into cellular phones or PDAs. By introducing the guardian proxy and other basic cryptographic primitives into RFID systems, our protocol is secure against the tag spoofing and swapping attacks. Moreover, our protocol enables ownership transfer.
UR - http://www.scopus.com/inward/record.url?scp=49049089801&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=49049089801&partnerID=8YFLogxK
U2 - 10.1109/ARES.2008.91
DO - 10.1109/ARES.2008.91
M3 - Conference contribution
AN - SCOPUS:49049089801
SN - 0769531024
SN - 9780769531021
T3 - ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
SP - 733
EP - 740
BT - ARES 2008 - 3rd International Conference on Availability, Security, and Reliability, Proceedings
T2 - 3rd International Conference on Availability, Security, and Reliability, ARES 2008
Y2 - 4 March 2008 through 7 March 2008
ER -