Privacy analysis of forward and backward untraceable RFID authentication schemes
In this paper, we analyze the rst known provably secure RFID authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in the L-K scheme without needing to corrupt tags. We also show that if a standard c...
Saved in:
| Main Authors: | , , , |
|---|---|
| Format: | Default Article |
| Published: |
2011
|
| Subjects: | |
| Online Access: | https://hdl.handle.net/2134/8188 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|