"Yoking-proofs" for RFID tags

RFID (radio-frequency identification) tags are small, inexpensive microchips capable of transmitting unique identifiers wirelessly over a short distance. Thanks to their utility in automating supply-chain logistics, RFID tags promise eventually to supplant the optical barcode as a means of identifying goods. We propose the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously. Our particular aim is to permit tags to generate a proof that is verifiable off-line by a trusted entity, even when readers are potentially untrusted. We suggest that such proofs are a useful tool for maintaining integrity in supply chains, particularly as RFID data will commonly flow across multiple, loosely affiliated organizations.

[1]  Victor Shoup,et al.  On Formal Models for Secure Key Exchange , 1999, IACR Cryptol. ePrint Arch..

[2]  Daniel W. Engels,et al.  I. Radio-Frequency Identification: Security Risks and Challenges , 2003 .

[3]  Kazuo Takaragi,et al.  An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.

[4]  Andries E. Brouwer The linear programming bound for binary linear codes , 1993, IEEE Trans. Inf. Theory.

[5]  D. McCullagh RFID tags : Big Brother in small pachkages , 2003 .

[6]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[7]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[8]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[9]  Simson L. Garfinkel,et al.  RFID privacy: an overview of problems and proposed solutions , 2005, IEEE Security & Privacy Magazine.

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Mihir Bellare,et al.  Random oracles are practical: a paradigm for designing efficient protocols , 1993, CCS '93.

[12]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[13]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[14]  Daniel W. Engels,et al.  Radio Frequency Identification and the Electronic Product Code , 2001, IEEE Micro.

[15]  A. Juels,et al.  Universal Re-encryption for Mixnets , 2004, CT-RSA.