T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags

نویسندگان

  • Kaoutar Elkhiyaoui
  • Erik-Oliver Blass
  • Refik Molva
چکیده

RFID-based tag matching allows a reader Rk to determine whether two tags Ti and Tj store some attributes that jointly fulfill a boolean constraint. The challenge in designing a matching mechanism is tag privacy. While cheap tags are unable to perform any computation, matching has to be achieved without revealing the tags’ attributes. In this paper, we present T-MATCH, a protocol for secure and privacy preserving RFID tag matching. T-MATCH involves a pair of tags Ti and Tj , a reader Rk, and a backend server S. To ensure tag privacy against Rk and S, T-MATCH employs a new technique based on secure two-party computation that prevents Rk and S from disclosing tag attributes. For tag privacy against eavesdroppers, each tag Ti in T-MATCH stores an IND-CPA encryption of its attribute. Such an encryption allows Rk to update the state of Ti by merely re-encrypting Ti’s ciphertext. T-MATCH targets cheap tags that cannot perform any computation, but are only required to store 150

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID)

While RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to product cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tag...

متن کامل

High-Speed Dating Privacy-Preserving Attribute Matching for RFID

This paper presents a new approach for RFID tag attribute matching problem. Unlike previous approaches, most notably the T-Match protocol, presented in [9], we do not need a central database server or any connectivity between readers. Furthermore, we do not need expensive homomorphic encryption or multiparty computation and we extend attribute matching to multiple attributes per tag; a feature ...

متن کامل

AnSta: Anonymous Statistics using RFID tags

Current work in RFID security focuses mainly on authentication and privacy preserving identification. In this paper, we discuss the possibility of widening the scope of RFID security by introducing a new application scenario. The application we propose aims at collecting statistics on some attributes. The main requirement is to perform this operation without violating the privacy of the holders...

متن کامل

Distributed Path Authentication for Dynamic RFID-Enabled Supply Chains

In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...

متن کامل

PCB: Physically Changeable Bit for Preserving Privacy in Low-End RFID Tags

Consumer privacy is a major concern impeding the wide deployment of radio-frequency identification (RFID) tags in consumer market. To tackle this privacy issue, a simple and effective approach is proposed in this paper via adding one bit called ”physically changeable bit” (PCB) in RFID tags. The PCB bit can and only can be altered ”physically”. It controls whether RFID tags respond to queries s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012