Lighten Encryption Schemes for Secure and Private RFID Systems

被引:0
|
作者
Canard, Sebastien [1 ]
Coisel, Iwen [2 ]
Etrog, Jonathan [3 ]
机构
[1] Orange Labs, 42 Rue Coutures,BP6234, F-14066 Caen, France
[2] UCL, B-1348 Louvain, Belgium
[3] Orange Labs, F-92794 Issy Les Moulineaux, France
来源
关键词
AUTHENTICATION; NOTIONS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We provide several concrete implementations of a generic method given by Vaudenay to construct secure privacy-preserving RE ID authentication and identification systems. More precisely, we give the first instantiation of the Vaudenay's result by using the IND-CCA secure DHAES cryptosystem. Next we argue that weaker cryptosystems can also be used by recalling the WIPR RFID system and giving a new protocol based on the El Carnal encryption scheme. After that, we introduce a new generic construction based on the use of any IND-CPA secure public key cryptosystem together with a MAC scheme and describe a possibility using the Hash El Carnal cryptosystem. We finally compare all these schemes, both in terms of implementation and security, proving that, nowadays the DHAES and our Hash El Carnal based solutions appear as the most promising schemes.
引用
收藏
页码:19 / +
页数:3
相关论文
共 50 条
  • [1] Secure and private search protocols for RFID systems
    Yanjun Zuo
    [J]. Information Systems Frontiers, 2010, 12 : 507 - 519
  • [2] Secure and private search protocols for RFID systems
    Zuo, Yanjun
    [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 507 - 519
  • [3] AnonPri: A secure anonymous private authentication protocol for RFID systems
    Rahman, Farzana
    Hoque, Md Endadul
    Ahamed, Sheikh Iqbal
    [J]. INFORMATION SCIENCES, 2017, 379 : 195 - 210
  • [4] Secure and private protocols for server-less RFID systems
    Jialiang, He
    Youjun, Xu
    Zhiqiang, Xu
    [J]. International Journal of Control and Automation, 2014, 7 (02): : 131 - 142
  • [5] Assessment of Encryption and Decryption Schemes for Secure Data Transmission in Healthcare Systems
    Adedeji, Kazeem B.
    Nwulu, Nnamdi I.
    Aigbavboa, Clinton
    Gbadamosi, Saheed L.
    [J]. 2019 IEEE AFRICON, 2019,
  • [6] Private and Secure Tag Access for Large-Scale RFID Systems
    Sun, Min-Te
    Sakai, Kazuya
    Ku, Wei-Shinn
    Lai, Ten H.
    Vasilakos, Athanasios V.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (06) : 657 - 671
  • [7] PSP: Private and secure payment with RFID
    Blass, Erik-Oliver
    Kurmus, Anil
    Molva, Refik
    Strufe, Thorsten
    [J]. COMPUTER COMMUNICATIONS, 2013, 36 (04) : 468 - 480
  • [8] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Eiichiro Fujisaki
    Tatsuaki Okamoto
    [J]. Journal of Cryptology, 2013, 26 : 80 - 101
  • [9] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [10] Secure Integration of Asymmetric and Symmetric Encryption Schemes
    Fujisaki, Eiichiro
    Okamoto, Tatsuaki
    [J]. JOURNAL OF CRYPTOLOGY, 2013, 26 (01) : 80 - 101