Visible to the public Universally Composable RFID Mutual Authentication

TitleUniversally Composable RFID Mutual Authentication
Publication TypeJournal Article
Year of Publication2017
AuthorsSu, C., Santoso, B., Li, Y., Deng, R. H., Huang, X.
JournalIEEE Transactions on Dependable and Secure Computing
Volume14
Pagination83–94
ISSN1545-5971
Keywordsadversary model, arbitrary environment, authentication, cryptographic protocol, cryptographic protocols, Human Behavior, human factors, message authentication code, Metrics, PKI Trust Models, privacy, Protocols, pubcrawl, Public key, public key cryptography, public key encryption, public key infrastructure, public key update protocols, radiofrequency identification, readers corruptions, Resiliency, RFID authentication, RFID mutual authentication protocols, RFID tags, Scalability, security notion, tags corruptions, trusted certificates, trusted cryptographic protocols, trusted third parties, universal composability, universally composable framework, zero-knowledge privacy model
Abstract

Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags' and readers' corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al. [1].

URLhttps://ieeexplore.ieee.org/document/7109876
DOI10.1109/TDSC.2015.2434376
Citation Keysu_universally_2017