Are RNGs Achilles' heel of RFID Security and Privacy Protocols ?
Atakan ArslanSüleyman KardasSultan Aldirmaz ÇolakSarp ErtürkPublished in: IACR Cryptol. ePrint Arch. (2016)
Keyphrases
- mutual authentication
- rfid systems
- authentication protocol
- security analysis
- rfid tags
- secure multiparty computation
- privacy protection
- security protocols
- privacy preserving
- security properties
- anti collision
- trusted third party
- security issues
- security services
- radio frequency identification
- security requirements
- radio frequency identification rfid
- cryptographic protocols
- rfid technology
- secret key
- lightweight
- private key
- security mechanisms
- security concerns
- semi honest
- security problems
- statistical databases
- security threats
- authentication scheme
- low cost
- personal data
- public key
- homomorphic encryption
- privacy issues
- smart card
- personal information
- key distribution
- privacy preserving data mining
- third party
- key exchange
- supply chain management
- security and privacy issues
- private information retrieval
- preserving privacy
- security risks
- hash functions
- data sharing
- private information
- resource constrained
- key management
- data privacy