Provable Privacy Workshop, 10 July 2012
Wide Strong Private RF IDentification based on Zero-Knowledge
Roel Peeters and Jens Hermans
Wide Strong Private RF IDentification based on Zero-Knowledge Roel - - PowerPoint PPT Presentation
Wide Strong Private RF IDentification based on Zero-Knowledge Roel Peeters and Jens Hermans Provable Privacy Workshop, 10 July 2012 RFID Privacy Wig model #4456 (cheap polyester) Replacement hip medical part #459382 Das Kapital and
Provable Privacy Workshop, 10 July 2012
Roel Peeters and Jens Hermans
500 Euros in wallet Serial numbers: 597387,389473… Wig model #4456 (cheap polyester) 30 items
Das Kapital and Communist-party handbook Replacement hip medical part #459382
500 Euros in wallet Serial numbers: 597387,389473… Wig model #4456 (cheap polyester) 30 items
Das Kapital and Communist-party handbook Replacement hip medical part #459382 55542390 41126751 09840921 54872164 93479122
DrawTag SendTag SendReader Result Weak Adversary FreeTag
DrawTag SendTag SendReader Result Forward Adversary Corrupt FreeTag
Forward Adversary Secret
DrawTag SendTag SendReader Result Strong Adversary Corrupt FreeTag
DrawTag SendTag SendReader Result Strong Adversary FreeTag Secret
! Requirements ! Correct ! Sound ! Private
Should not be neglected !
Not sound Not correct
! RFID Identification protocol that is: ! Secure ! Wide-strong private ! Efficient ! Compact hardware
! Secure, wide-strong private protocols require Public Key
Cryptography
! Elliptic Curve Cryptography coprocessor can be implemented on
RFID [LBSV’07] [WH’11]
! Limit the number of cryptographic building blocks, e.g. ideally no
hash functions
! Two known protocols: ! Vaudenay’s Public Key Encryption ! Canard et al.’s Hashed ElGamal ! Both based on (variant) IND-CCA2
IND-CCA2
One More Discrete Logarithm, just like Schnorr
Diffie Hellman One More Discrete Logarithm, just like Schnorr
ECC-based, no hash to keep HW design compact Diffie Hellman One More Discrete Logarithm, just like Schnorr Oracle Diffie Hellman
! Proven security and wide-strong privacy ! Efficient : only 2 EC multiplications ! Compact HW: no hash function
! http://eprint.iacr.org/2012/389