Monday, 6 September 2010

A new framework for RFID Privacy

R.H.Deng, Y. Li, A. Yao, M. Yung, Y. Zhao

two contributions:

1. new framework based on ZK formulation

   [ZK is a basic tool? ]

2. new protocol based on Ma et al. 's work, to show that new framework is practical


Structure:

  1. Introduction

  2. Preliminaries

     algorithm, set, function, pseudorandom function

  3. Model of RFID systems

     3.1 RFID System Setting

     3.2 Adversary

     3.3 Adaptive Completeness and Mutual Authentication

        "define RFID system to be complete in terms of protocol adaptive
      completeness, and sound in terms of protocol mutual authentication" ?

  4. ZK based RFID privacy

    4.1 discussions

  5  Comparison with Existing RFID Security and Privacy Frameworks

    5.1 Comparison with Ari Juels's  model   [percomm 07]

        coauthor:Stephen A. Weis, Ron Rivest's student

    5.2 Comparison with Model of S. Vaudenay
  
        http://lasecwww.epfl.ch/~vaudenay/


       Asiacrypt 07

       AsiaCCS 08

    5.3 Comparison with models of Zhou et al.  and Ma et al.

       esorics 2008

       CCS 09

    5.4 Comparison with Traditional Formulation of Zero-Knowledge

       O. Goldereich. The foundations of cryptography  2001
  
       S. Goldwasser, S. Micali and C. Rackoff.  STOC 1985

  6 An RFID Protocol within Our Framework

  7 Conclusion and Future Work

  Appendix:

    A  Pseudorandom Functions

    B  Proof details for Theorem 2

         the protocol is

       3 steps:  adaptive completeness, mutual authentication, zk-privacy

No comments:

Post a Comment