Universally Composable RFID Mutual Authentication
Title | Universally Composable RFID Mutual Authentication |
Publication Type | Journal Article |
Year of Publication | 2017 |
Authors | Su, C., Santoso, B., Li, Y., Deng, R. H., Huang, X. |
Journal | IEEE Transactions on Dependable and Secure Computing |
Volume | 14 |
Pagination | 83–94 |
ISSN | 1545-5971 |
Keywords | adversary model, arbitrary environment, authentication, cryptographic protocol, cryptographic protocols, Human Behavior, human factors, message authentication code, Metrics, PKI Trust Models, privacy, Protocols, pubcrawl, Public key, public key cryptography, public key encryption, public key infrastructure, public key update protocols, radiofrequency identification, readers corruptions, Resiliency, RFID authentication, RFID mutual authentication protocols, RFID tags, Scalability, security notion, tags corruptions, trusted certificates, trusted cryptographic protocols, trusted third parties, universal composability, universally composable framework, zero-knowledge privacy model |
Abstract | Universally Composable (UC) framework provides the strongest security notion for designing fully trusted cryptographic protocols, and it is very challenging on applying UC security in the design of RFID mutual authentication protocols. In this paper, we formulate the necessary conditions for achieving UC secure RFID mutual authentication protocols which can be fully trusted in arbitrary environment, and indicate the inadequacy of some existing schemes under the UC framework. We define the ideal functionality for RFID mutual authentication and propose the first UC secure RFID mutual authentication protocol based on public key encryption and certain trusted third parties which can be modeled as functionalities. We prove the security of our protocol under the strongest adversary model assuming both the tags' and readers' corruptions. We also present two (public) key update protocols for the cases of multiple readers: one uses Message Authentication Code (MAC) and the other uses trusted certificates in Public Key Infrastructure (PKI). Furthermore, we address the relations between our UC framework and the zero-knowledge privacy model proposed by Deng et al. [1]. |
URL | https://ieeexplore.ieee.org/document/7109876 |
DOI | 10.1109/TDSC.2015.2434376 |
Citation Key | su_universally_2017 |
- security notion
- public key update protocols
- radiofrequency identification
- readers corruptions
- Resiliency
- RFID Authentication
- RFID mutual authentication protocols
- RFID tags
- Scalability
- public key infrastructure
- tags corruptions
- trusted certificates
- trusted cryptographic protocols
- trusted third parties
- universal composability
- universally composable framework
- zero-knowledge privacy model
- adversary model
- public key encryption
- public key cryptography
- Public key
- pubcrawl
- Protocols
- privacy
- PKI Trust Models
- Metrics
- message authentication code
- Human Factors
- Human behavior
- Cryptographic Protocols
- cryptographic protocol
- authentication
- arbitrary environment