Mobility

Privacy-Preserving RFID Systems: Model and Constructions

Download Now Date Added: Jul 2010
Format: PDF

In this paper, the authors study systems where a reader wants to authenticate and identify legitimate RFID tags. Such system needs thus to be correct (Legitimate tags are accepted) and sound (Fake tags are rejected). Moreover, an RFID tag in a privacy-preserving system should be anonymous and untraceable, except for the legitimate reader. The authors here present the first security model for RFID authentication/identification privacy preserving systems which is at the same time complete and easy to use.