Key Updates for RFID Distance-Bounding Protocols: Achieving Narrow-Destructive Privacy.
Cristina OnetePublished in: IACR Cryptol. ePrint Arch. (2012)
Keyphrases
- mutual authentication
- rfid systems
- privacy preserving
- low cost
- rfid tags
- security analysis
- secure multiparty computation
- authentication protocol
- security issues
- supply chain
- distance measure
- data collection
- upper bound
- private information retrieval
- security properties
- statistical databases
- euclidean distance
- multi party
- differential privacy
- rfid technology
- privacy protection
- privacy issues
- radio frequency identification
- smart card
- location privacy
- distance function
- lower bound