Untraceable RFID tags via insubvertible encryption
Untraceable RFID tags via insubvertible encryption
Ateniese, Giuseppe; Camenisch, Jan; de Medeiros, Breno
2005-11-07 00:00:00
Untraceable RFID Tags via Insubvertible Encryption Giuseppe Ateniese The Johns Hopkins University Jan Camenisch IBM Research Breno de Medeiros Florida State University [email protected][email protected][email protected] ABSTRACT We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain universal re-encryption schemes, insubvertible encryption prevents against adversarial exploitation of hidden channels, by including certi cates proving that the ciphertext can only be decrypted by authorized parties. The scheme can be applied to RFID tags, providing strong protection against tracing. This enables post-sale applications of manufacturer-issued RFID tags while preserving the privacy of consumers. The functionality required of the RFID tags is minimal, namely that they be re-writable (many-writable). No cryptographic capabilities are required of the tags themselves, as the readers perform all necessary computations. Categories and Subject Descriptors: K.6.5 [Security and Protection] General Terms: Algorithms, Security. Keywords: Universal re-encryption, bilinear maps, RFID privacy. 1. INTRODUCTION Smart tags are radio-frequency powered/emitting identi cation (RFID) that are being phased in as product labels, in substitution of, or in addition to, barcode tags. However, unlike barcodes and other consumer labeling techniques, RFID tags record a su ciently long
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pnghttp://www.deepdyve.com/lp/association-for-computing-machinery/untraceable-rfid-tags-via-insubvertible-encryption-4PmXzfhZu3
Untraceable RFID tags via insubvertible encryption
Untraceable RFID Tags via Insubvertible Encryption Giuseppe Ateniese The Johns Hopkins University Jan Camenisch IBM Research Breno de Medeiros Florida State University [email protected][email protected][email protected] ABSTRACT We introduce a new cryptographic primitive, called insubvertible encryption, that produces ciphertexts which can be randomized without the need of any key material. Unlike plain universal re-encryption schemes, insubvertible encryption prevents against adversarial exploitation of hidden channels, by including certi cates proving that the ciphertext can only be decrypted by authorized parties. The scheme can be applied to RFID tags, providing strong protection against tracing. This enables post-sale applications of manufacturer-issued RFID tags while preserving the privacy of consumers. The functionality required of the RFID tags is minimal, namely that they be re-writable (many-writable). No cryptographic capabilities are required of the tags themselves, as the readers perform all necessary computations. Categories and Subject Descriptors: K.6.5 [Security and Protection] General Terms: Algorithms, Security. Keywords: Universal re-encryption, bilinear maps, RFID privacy. 1. INTRODUCTION Smart tags are radio-frequency powered/emitting identi cation (RFID) that are being phased in as product labels, in substitution of, or in addition to, barcode tags. However, unlike barcodes and other consumer labeling techniques, RFID tags record a su ciently long
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.