Sciweavers

Share
SACRYPT
2005
Springer

A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags

10 years 10 months ago
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
The ability to link two different sightings of the same Radio Frequency Identification (RFID) tag enables invasions of privacy. The problem is aggravated when an item, and the tag attached to it, changes hands during the course of its lifetime. After such an ownership transfer, the new owner should be able to read the tag but the old owner should not. We address these issues through an RFID pseudonym protocol. Each time it is queried, the RFID tag emits a different pseudonym using a pseudo-random function. Without consent of a special Trusted Center that shares secrets with the tag, it is infeasible to map the pseudonym to the tag’s real identity. We present a scheme for RFID pseudonyms that works with legacy, untrusted readers, requires only one message from tag to reader, and is scalable: decoding tag pseudonyms takes work logarithmic in the number of tags. Our scheme further allows for time-limited delegation, so that we can give an RFID reader the power to disambiguate a limit...
David Molnar, Andrea Soppera, David Wagner
Added 28 Jun 2010
Updated 28 Jun 2010
Type Conference
Year 2005
Where SACRYPT
Authors David Molnar, Andrea Soppera, David Wagner
Comments (0)
books