Computer Science – Cryptography and Security
Scientific paper
2009-07-07
Computer Science
Cryptography and Security
15 pages, 1 figure, presented at RFIDSec 09
Scientific paper
In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#
Halevi Shai
Halevi Tzipora
Saxena Nitesh
No associations
LandOfFree
Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-356179