Privacy analysis of forward and backward untraceable RFID authentication schemes

In this paper, we analyze the rst known provably secure RFID authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in the L-K scheme without needing to corrupt tags. We also show that if a standard c...

Full description

Saved in:
Bibliographic Details
Main Authors: Raphael C.-W. Phan, Jiang Wu, Khaled Ouafi, Douglas R. Stinson
Format: Default Article
Published: 2011
Subjects:
Online Access:https://hdl.handle.net/2134/8188
Tags: Add Tag
No Tags, Be the first to tag this record!