A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Analysis and Construction of Efficient RFID Authentication Protocol with Backward Privacy
[chapter]
2013
Communications in Computer and Information Science
Privacy of RFID systems is receiving increasing attentions in the RFID community and an important issue required as to the security of RFID system. Backward privacy means the adversary can not trace the tag later even if he reveals the internal states of the tag sometimes before. In this paper, we analyze two recently proposed RFID authentication schemes: Randomized GPS and Randomized Hashed GPS scheme. We show both of them can not provide backward privacy in Juels and Weis privacy model, which
doi:10.1007/978-3-642-36252-1_43
fatcat:2ynymzxaenhjdaot2cuh4iicwy