R.H.Deng, Y. Li, A. Yao, M. Yung, Y. Zhao
two contributions:
1. new framework based on ZK formulation
[ZK is a basic tool? ]
2. new protocol based on Ma et al. 's work, to show that new framework is practical
Structure:
1. Introduction
2. Preliminaries
algorithm, set, function, pseudorandom function
3. Model of RFID systems
3.1 RFID System Setting
3.2 Adversary
3.3 Adaptive Completeness and Mutual Authentication
"define RFID system to be complete in terms of protocol adaptive
completeness, and sound in terms of protocol mutual authentication" ?
4. ZK based RFID privacy
4.1 discussions
5 Comparison with Existing RFID Security and Privacy Frameworks
5.1 Comparison with Ari Juels's model [percomm 07]
coauthor:Stephen A. Weis, Ron Rivest's student
5.2 Comparison with Model of S. Vaudenay
http://lasecwww.epfl.ch/~vaudenay/
Asiacrypt 07
AsiaCCS 08
5.3 Comparison with models of Zhou et al. and Ma et al.
esorics 2008
CCS 09
5.4 Comparison with Traditional Formulation of Zero-Knowledge
O. Goldereich. The foundations of cryptography 2001
S. Goldwasser, S. Micali and C. Rackoff. STOC 1985
6 An RFID Protocol within Our Framework
7 Conclusion and Future Work
Appendix:
A Pseudorandom Functions
B Proof details for Theorem 2
the protocol is
3 steps: adaptive completeness, mutual authentication, zk-privacy
No comments:
Post a Comment