메뉴 건너뛰기




Volumn 5037 LNCS, Issue , 2008, Pages 479-489

Traceable privacy of recent provably-secure RFID protocols

Author keywords

Authentication protocols; Privacy; RFID; Untraceability

Indexed keywords

ACCESS CONTROL; ARCHITECTURAL DESIGN; AUTHENTICATION; CANNING; CRYPTOGRAPHY; INTERNET; LAWS AND LEGISLATION; METROPOLITAN AREA NETWORKS; NETWORK PROTOCOLS; NETWORK SECURITY;

EID: 45749087762     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-68914-0_29     Document Type: Conference Paper
Times cited : (66)

References (35)
  • 3
    • 84873466407 scopus 로고    scopus 로고
    • Authenticated Key Exchange Secure against Dictionary Attacks
    • Preneel, B, ed, EUROCRYPT 2000, Springer, Heidelberg
    • Bellare, M., Pointcheval, D., Rogaway, P.: Authenticated Key Exchange Secure against Dictionary Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 139-155. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1807 , pp. 139-155
    • Bellare, M.1    Pointcheval, D.2    Rogaway, P.3
  • 4
    • 0035163054 scopus 로고    scopus 로고
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001) Full version available at IACR ePrint Archive (last revised, 13 December 2005), http://eprint.iacr.org/2000/067
    • Canetti, R.: Universally Composable Security: A New Paradigm for Cryptographic Protocols. In: Proc. IEEE FOCS 2001, pp. 136-145 (2001) Full version available at IACR ePrint Archive (last revised, 13 December 2005), http://eprint.iacr.org/2000/067
  • 5
    • 38049173955 scopus 로고    scopus 로고
    • Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, 4298, pp. 391-404. Springer, Heidelberg (2007)
    • Carluccio, D., Lemke, K., Paar, C.: E-Passport: The Global Traceability or How to Feel Like a UPS Package. In: Lee, J.K., Yi, O., Yung, M. (eds.) WISA 2006. LNCS, vol. 4298, pp. 391-404. Springer, Heidelberg (2007)
  • 6
    • 45749101241 scopus 로고    scopus 로고
    • CASPIAN, Boycott Benetton (accessed 19, September 2007), http://www. boycottbenetton.com
    • CASPIAN, Boycott Benetton (accessed 19, September 2007), http://www. boycottbenetton.com
  • 7
    • 33845638668 scopus 로고    scopus 로고
    • Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting
    • Choo, K.-K.R.: Refuting Security Proofs for Tripartite Key Exchange with Model Checker in Planning Problem Setting. In: Proceedings of IEEE CSFW 2006, pp. 297-308 (2006)
    • (2006) Proceedings of IEEE , vol.CSFW 2006 , pp. 297-308
    • Choo, K.-K.R.1
  • 8
    • 26444442332 scopus 로고    scopus 로고
    • Choo, K.-K.R., Hitchcock, Y.: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, 3574, pp. 429-442. Springer, Heidelberg (2005)
    • Choo, K.-K.R., Hitchcock, Y.: Security Requirements for Key Establishment Proof Models: Revisiting Bellare-Rogaway and Jeong-Katz-Lee Protocols. In: Boyd, C., González Nieto, J.M. (eds.) ACISP 2005. LNCS, vol. 3574, pp. 429-442. Springer, Heidelberg (2005)
  • 9
    • 33646180371 scopus 로고    scopus 로고
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably-Secure Key Establishment Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, 3715, pp. 116-131. Springer, Heidelberg (2005)
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: On Session Key Construction in Provably-Secure Key Establishment Protocols. In: Dawson, E., Vaudenay, S. (eds.) Mycrypt 2005. LNCS, vol. 3715, pp. 116-131. Springer, Heidelberg (2005)
  • 10
    • 33646805409 scopus 로고    scopus 로고
    • Examining Indistinguishability- based Proof Models for Key Establishment Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Examining Indistinguishability- based Proof Models for Key Establishment Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 585-604. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 585-604
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 11
    • 33646779184 scopus 로고    scopus 로고
    • Errors in Computational Complexity Proofs for Protocols
    • Roy, B, ed, ASIACRYPT 2005, Springer, Heidelberg
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y.: Errors in Computational Complexity Proofs for Protocols. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 624-643. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3788 , pp. 624-643
    • Choo, K.-K.R.1    Boyd, C.2    Hitchcock, Y.3
  • 12
    • 23944475681 scopus 로고    scopus 로고
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On Session Identifiers in Provably Secure Protocols. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, 3352, pp. 351-366. Springer, Heidelberg (2005)
    • Choo, K.-K.R., Boyd, C., Hitchcock, Y., Maitland, G.: On Session Identifiers in Provably Secure Protocols. In: Blundo, C., Cimato, S. (eds.) SCN 2004. LNCS, vol. 3352, pp. 351-366. Springer, Heidelberg (2005)
  • 13
    • 38549131714 scopus 로고    scopus 로고
    • Vulnerabilities in First-Generation RFID-enabled Credit Cards
    • Proceedings of Financial Cryptography, Springer, Heidelberg
    • Heydt-Benjamin, T.S., Bailey, D.V., Fu, K., Juels, A., O'Hare, T.: Vulnerabilities in First-Generation RFID-enabled Credit Cards. In: Proceedings of Financial Cryptography 2007. LNCS, vol. 4886, pp. 2-14. Springer, Heidelberg (2008)
    • (2007) LNCS , vol.4886 , pp. 2-14
    • Heydt-Benjamin, T.S.1    Bailey, D.V.2    Fu, K.3    Juels, A.4    O'Hare, T.5
  • 14
    • 33845240394 scopus 로고    scopus 로고
    • Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, 4266, pp. 152-167. Springer, Heidelberg (2006)
    • Hoepman, J.-H., Hubbers, E., Jacobs, B., Oostdijk, M., Schreur, R.W.: Crossing Borders: Security and Privacy Issues of the European e-Passport. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 152-167. Springer, Heidelberg (2006)
  • 15
    • 33847249519 scopus 로고    scopus 로고
    • Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2007) Full version available at IACR ePrint Archive (last revised 18 September 2007), http://eprint.iacr.org/2005/095
    • Juels, A., Molnar, D., Wagner, D.: Security and Privacy Issues in E-Passports. In: Proceedings of SecureComm 2005, pp. 74-88 (2007) Full version available at IACR ePrint Archive (last revised 18 September 2007), http://eprint.iacr.org/2005/095
  • 16
    • 34547687590 scopus 로고    scopus 로고
    • Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: Proceedings of PerCom 2007, April 7, 2006, pp. 342-347 (2007) Full version available at IACR ePrint Archive http://eprint.iacr.org/2006/137
    • Juels, A., Weis, S.A.: Defining Strong Privacy for RFID. In: Proceedings of PerCom 2007, April 7, 2006, pp. 342-347 (2007) Full version available at IACR ePrint Archive http://eprint.iacr.org/2006/137
  • 17
    • 36349031223 scopus 로고    scopus 로고
    • An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports
    • IFIP
    • Kosta, E., Meints, M., Hensen, M., Gasson, M.: An Analysis of Security and Privacy Issues Relating to RFID Enabled ePassports. In: Proceedings of IFIP SEC 2007, IFIP 232, pp. 467-472 (2007)
    • (2007) Proceedings of IFIP SEC , vol.232 , pp. 467-472
    • Kosta, E.1    Meints, M.2    Hensen, M.3    Gasson, M.4
  • 18
    • 34748848124 scopus 로고    scopus 로고
    • Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proceedings of ASIACCS 2007, February 14, 2007, pp. 242-252 (2007); Full version titled Forward-Secure RFID Authentication and Key Exchange, IACR ePrint Archive, http://eprint.iacr.org/2007/051,
    • Le, T.V., Burmester, M., de Medeiros, B.: Universally Composable and Forward-Secure RFID Authentication and Authenticated Key Exchange. In: Proceedings of ASIACCS 2007, February 14, 2007, pp. 242-252 (2007); Full version titled Forward-Secure RFID Authentication and Key Exchange, IACR ePrint Archive, http://eprint.iacr.org/2007/051,
  • 19
    • 84977783611 scopus 로고    scopus 로고
    • Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer
    • Ning, P, Qing, S, Li, N, eds, ICICS 2006, Springer, Heidelberg
    • Lim, C.H., Kwon, T.: Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 1-20. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4307 , pp. 1-20
    • Lim, C.H.1    Kwon, T.2
  • 22
    • 41549168688 scopus 로고    scopus 로고
    • About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication
    • Monnerat, J., Vaudenay, S., Vuagnoux, M.: About Machine-Readable Travel Documents: Privacy Enhancement using (Weakly) Non-Transferable Data Authentication. In: Proceedings of RFIDSec 2007, pp. 15-28 (2007)
    • (2007) Proceedings of RFIDSec , pp. 15-28
    • Monnerat, J.1    Vaudenay, S.2    Vuagnoux, M.3
  • 23
    • 0024983231 scopus 로고
    • Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks
    • Naor, M., Yung, M.: Public-Key Cryptosystems Provably Secure against Chosen Ciphertext Attacks. In: Proceedings of STOC 1990, pp. 427-437 (1990)
    • (1990) Proceedings of STOC 1990 , pp. 427-437
    • Naor, M.1    Yung, M.2
  • 25
    • 41549161615 scopus 로고    scopus 로고
    • Privacy of Recent RFID Authentication Protocols
    • Proceedings of ISPEC, Springer, Heidelberg
    • Ouafi, K., Phan, R.C.-W.: Privacy of Recent RFID Authentication Protocols. In: Proceedings of ISPEC 2008. LNCS, vol. 4991, pp. 263-277. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4991 , pp. 263-277
    • Ouafi, K.1    Phan, R.C.-W.2
  • 27
    • 33746600612 scopus 로고    scopus 로고
    • Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange using Different Passwords. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 226-238. Springer, Heidelberg (2006)
    • Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange using Different Passwords. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 226-238. Springer, Heidelberg (2006)
  • 28
    • 37549042706 scopus 로고    scopus 로고
    • Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
    • Barua, R, Lange, T, eds, INDOCRYPT 2006, Springer, Heidelberg
    • Phan, R.C.-W., Goi, B.-M.: Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. In: Barua, R., Lange, T. (eds.) INDOCRYPT 2006. LNCS, vol. 4329, pp. 104-117. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4329 , pp. 104-117
    • Phan, R.C.-W.1    Goi, B.-M.2
  • 29
    • 84974554584 scopus 로고
    • Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack
    • Feigenbaum, J, ed, CRYPTO 1991, Springer, Heidelberg
    • Rackoff, C., Simon, D.R.: Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 434-444. Springer, Heidelberg (1992)
    • (1992) LNCS , vol.576 , pp. 434-444
    • Rackoff, C.1    Simon, D.R.2
  • 30
    • 35048852068 scopus 로고    scopus 로고
    • Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, 3321, pp. 13-32. Springer, Heidelberg (2004)
    • Rogaway, P.: On the Role Definitions in and Beyond Cryptography. In: Maher, M.J. (ed.) ASIAN 2004. LNCS, vol. 3321, pp. 13-32. Springer, Heidelberg (2004)
  • 31
    • 12344258539 scopus 로고
    • Efficient signature generation by smart cards
    • Schnorr, C.P.: Efficient signature generation by smart cards. Journal of Cryptology 4(3), 161-174 (1991)
    • (1991) Journal of Cryptology , vol.4 , Issue.3 , pp. 161-174
    • Schnorr, C.P.1
  • 33
    • 33750290259 scopus 로고    scopus 로고
    • YA-TRAP: Yet Another Trivial RFID Authentication Protocol
    • Tsudik, G.: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: Proceedings of PerCom 2006, pp. 640-643 (2006)
    • (2006) Proceedings of PerCom , pp. 640-643
    • Tsudik, G.1
  • 34
    • 34547414125 scopus 로고    scopus 로고
    • RFID Privacy based on Public-Key Cryptography
    • Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
    • Vaudenay, S.: RFID Privacy based on Public-Key Cryptography. In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4296 , pp. 1-6
    • Vaudenay, S.1
  • 35
    • 38149038702 scopus 로고    scopus 로고
    • On Privacy Models for RFID
    • Kurosawa, K, ed, ASIACRYPT 2007, Springer, Heidelberg
    • Vaudenay, S.: On Privacy Models for RFID. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 68-87. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4833 , pp. 68-87
    • Vaudenay, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.