Universally composable RFID mutual authentication

Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achievi...

Full description

Saved in:
Bibliographic Details
Main Authors: SU, Chunhua, SANTOSO, Bagus, Yingjiu LI, DENG, Robert H., HUANG, Xinyi
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2017
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3341
https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4343
record_format dspace
spelling sg-smu-ink.sis_research-43432018-11-27T07:12:48Z Universally composable RFID mutual authentication SU, Chunhua SANTOSO, Bagus Yingjiu LI, DENG, Robert H. HUANG, Xinyi Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags’ and readers’ corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al. 2017-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3341 info:doi/10.1109/TDSC.2015.2434376 https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University universal composability cryptographic protocol RFID authentication Computer Sciences Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic universal composability
cryptographic protocol
RFID authentication
Computer Sciences
Information Security
spellingShingle universal composability
cryptographic protocol
RFID authentication
Computer Sciences
Information Security
SU, Chunhua
SANTOSO, Bagus
Yingjiu LI,
DENG, Robert H.
HUANG, Xinyi
Universally composable RFID mutual authentication
description Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags’ and readers’ corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al.
format text
author SU, Chunhua
SANTOSO, Bagus
Yingjiu LI,
DENG, Robert H.
HUANG, Xinyi
author_facet SU, Chunhua
SANTOSO, Bagus
Yingjiu LI,
DENG, Robert H.
HUANG, Xinyi
author_sort SU, Chunhua
title Universally composable RFID mutual authentication
title_short Universally composable RFID mutual authentication
title_full Universally composable RFID mutual authentication
title_fullStr Universally composable RFID mutual authentication
title_full_unstemmed Universally composable RFID mutual authentication
title_sort universally composable rfid mutual authentication
publisher Institutional Knowledge at Singapore Management University
publishDate 2017
url https://ink.library.smu.edu.sg/sis_research/3341
https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf
_version_ 1770573116747022336