RFID System with Fairness Within the Framework of Security and Privacy

Radio Frequency Identification (RFID) systems are expected to be widely deployed in automated identification and supply-chain applications. Although RFID systems have several advantages, the technology may also create new threats to user privacy. In this paper, we propose the Fair RFID system. This involves improving the security and privacy of existing RFID systems while keeping in line with procedures already accepted by the industrial world. The proposed system enables the protection of users’ privacy from unwanted scanning, and, when necessary, is conditionally traceable to the tag by authorized administrators.

[1]  Daniel W. Engels,et al.  RFID Systems and Security and Privacy Implications , 2002, CHES.

[2]  Ronald L. Rivest,et al.  The blocker tag: selective blocking of RFID tags for consumer privacy , 2003, CCS '03.

[3]  Dongho Won,et al.  Proxy signatures, Revisited , 1997, ICICS.

[4]  Torben P. Pedersen A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Dongho Won,et al.  Challenge-Response Based RFID Authentication Protocol for Distributed Database Environment , 2005, SPC.

[7]  Philippe Oechslin,et al.  A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[8]  Paul Feldman,et al.  A practical scheme for non-interactive verifiable secret sharing , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[9]  Philippe Oechslin,et al.  RFID Traceability: A Multilayer Problem , 2005, Financial Cryptography.

[10]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[11]  Koutarou Suzuki,et al.  Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .

[12]  Martin Tompa,et al.  How to share a secret with cheaters , 1988, Journal of Cryptology.

[13]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[14]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[15]  Tom Ahlkvist Scharfeld An analysis of the fundamental constraints on low cost passive radio-frequency identification system design , 2001 .

[16]  Ari Juels,et al.  Squealing Euros: Privacy Protection in RFID-Enabled Banknotes , 2003, Financial Cryptography.

[17]  István Vajda,et al.  Lightweight Authentication Protocols for Low-Cost RFID Tags , 2003 .

[18]  Christian Cachin On-Line Secret Sharing , 1995, IMACC.

[19]  Dieter Gollmann,et al.  Secret Sharing with Reusable Polynomials , 1997, ACISP.

[20]  Daniel W. Engels,et al.  The reader collision problem , 2002, IEEE International Conference on Systems, Man and Cybernetics.