T-Match: Privacy-Preserving Item Matching for Storage-Only RFID Tags
نویسندگان
چکیده
RFID-based tag matching allows a reader Rk to determine whether two tags Ti and Tj store some attributes that jointly fulfill a boolean constraint. The challenge in designing a matching mechanism is tag privacy. While cheap tags are unable to perform any computation, matching has to be achieved without revealing the tags’ attributes. In this paper, we present T-MATCH, a protocol for secure and privacy preserving RFID tag matching. T-MATCH involves a pair of tags Ti and Tj , a reader Rk, and a backend server S. To ensure tag privacy against Rk and S, T-MATCH employs a new technique based on secure two-party computation that prevents Rk and S from disclosing tag attributes. For tag privacy against eavesdroppers, each tag Ti in T-MATCH stores an IND-CPA encryption of its attribute. Such an encryption allows Rk to update the state of Ti by merely re-encrypting Ti’s ciphertext. T-MATCH targets cheap tags that cannot perform any computation, but are only required to store 150
منابع مشابه
Security and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID)
While RFID systems are one of the key enablers helping the prototype of pervasive computer applications, the deployment of RFID technologies also comes with new privacy and security concerns ranging from people tracking and industrial espionage to product cloning and denial of service. Cryptographic solutions to tackle these issues were in general challenged by the limited resources of RFID tag...
متن کاملHigh-Speed Dating Privacy-Preserving Attribute Matching for RFID
This paper presents a new approach for RFID tag attribute matching problem. Unlike previous approaches, most notably the T-Match protocol, presented in [9], we do not need a central database server or any connectivity between readers. Furthermore, we do not need expensive homomorphic encryption or multiparty computation and we extend attribute matching to multiple attributes per tag; a feature ...
متن کاملAnSta: Anonymous Statistics using RFID tags
Current work in RFID security focuses mainly on authentication and privacy preserving identification. In this paper, we discuss the possibility of widening the scope of RFID security by introducing a new application scenario. The application we propose aims at collecting statistics on some attributes. The main requirement is to perform this operation without violating the privacy of the holders...
متن کاملDistributed Path Authentication for Dynamic RFID-Enabled Supply Chains
In this paper, we propose a distributed path authentication solution for dynamic RFID-enabled supply chains to address the counterfeiting problem. Compared to existing general anti-counterfeiting solutions, our solution requires non sharing of item-level RFID information among supply chain parties, thus eliminating the requirement on high network bandwidth and fine-grained access control. Our s...
متن کاملPCB: Physically Changeable Bit for Preserving Privacy in Low-End RFID Tags
Consumer privacy is a major concern impeding the wide deployment of radio-frequency identification (RFID) tags in consumer market. To tackle this privacy issue, a simple and effective approach is proposed in this paper via adding one bit called ”physically changeable bit” (PCB) in RFID tags. The PCB bit can and only can be altered ”physically”. It controls whether RFID tags respond to queries s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012