Universally composable RFID mutual authentication
Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achievi...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2017
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3341 https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4343 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-43432018-11-27T07:12:48Z Universally composable RFID mutual authentication SU, Chunhua SANTOSO, Bagus Yingjiu LI, DENG, Robert H. HUANG, Xinyi Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags’ and readers’ corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al. 2017-01-01T08:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3341 info:doi/10.1109/TDSC.2015.2434376 https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University universal composability cryptographic protocol RFID authentication Computer Sciences Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
universal composability cryptographic protocol RFID authentication Computer Sciences Information Security |
spellingShingle |
universal composability cryptographic protocol RFID authentication Computer Sciences Information Security SU, Chunhua SANTOSO, Bagus Yingjiu LI, DENG, Robert H. HUANG, Xinyi Universally composable RFID mutual authentication |
description |
Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags’ and readers’ corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al. |
format |
text |
author |
SU, Chunhua SANTOSO, Bagus Yingjiu LI, DENG, Robert H. HUANG, Xinyi |
author_facet |
SU, Chunhua SANTOSO, Bagus Yingjiu LI, DENG, Robert H. HUANG, Xinyi |
author_sort |
SU, Chunhua |
title |
Universally composable RFID mutual authentication |
title_short |
Universally composable RFID mutual authentication |
title_full |
Universally composable RFID mutual authentication |
title_fullStr |
Universally composable RFID mutual authentication |
title_full_unstemmed |
Universally composable RFID mutual authentication |
title_sort |
universally composable rfid mutual authentication |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2017 |
url |
https://ink.library.smu.edu.sg/sis_research/3341 https://ink.library.smu.edu.sg/context/sis_research/article/4343/viewcontent/UniversallyComposableRFID.pdf |
_version_ |
1770573116747022336 |