Abstract
RFID(Radio Frequency Identification) system will play a critical role providing widespread services in a ubiquitous environment. However, widespread use of RFID tags may create new threats to a consumer privacy such as information leakage and traceability. It is difficult to solve the problems because a tag has the limited computing power that lacks of supporting the general encryption. Although the scheme of [2] protects a consumer privacy using an external agent, a tag should perform exponential operation requiring high cost. We propose Self Re-Encryption Protocol(SREP) which provides strong privacy without help of any external agent. SREP is well suitable for low cost RFID systems since it only needs multiplication and exclusive-or operation.
This research was supported by grant No.R01–2004–000–10704–0 from the Korea Science & Engineering Foundation.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Juels, A., Pappu, R.: Squealing euros: Privacy protection in RFID-enabled banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Saito, J., Ryou, J., Sakurai, K.: Enhancing privacy of universal re-encryption scheme for RFID tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)
Juels, A., Rivest, R.L., Szudlo, M.: The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. ACM CCS, 103–111 (October 2003)
Rhee, K., Kwak, J., Kim, S., Won, D.H.: Challenge-response based RFID authentication protocol for distributed database environment. In: Hutter, D., Ullmann, M. (eds.) SPC 2005. LNCS, vol. 3450, pp. 70–84. Springer, Heidelberg (2005)
mCloak: Personal/corporate management of wireless devices and technology (2003), http://www.mogilecloak.com
Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to ‘Privacy-Friendly’ Tags. In: RFID Privacy Workshop (November 2003)
Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Ubcomp 2004 workshop (September 2004)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Weis, S.A.: Security and Privacy in Radio-Frequency Identification Devices. Master Thesis, MIT (May 2003)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems and security and privacy implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)
Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Park, J.S., Lee, S.M., Choi, E.Y., Lee, D.H. (2006). Self Re-encryption Protocol Providing Strong Privacy for Low Cost RFID System. In: Gavrilova, M.L., et al. Computational Science and Its Applications - ICCSA 2006. ICCSA 2006. Lecture Notes in Computer Science, vol 3983. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11751632_34
Download citation
DOI: https://doi.org/10.1007/11751632_34
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34077-5
Online ISBN: 978-3-540-34078-2
eBook Packages: Computer ScienceComputer Science (R0)