메뉴 건너뛰기




Volumn , Issue , 2007, Pages 297-306

Covert channels in privacy-preserving identification systems

Author keywords

Covert channels; Identification; Mobile; Privacy; RFID

Indexed keywords

COMPLEXITY ASSUMPTIONS; COVERT CHANNELS; IDENTIFICATION SYSTEMS; PRIVACY BREACHES; PRIVACY MODELS; PRIVACY PRESERVING; PUBLIC VERIFIABILITY; RF-ID TAGS; SECRET KEY; TAG IDENTIFICATION;

EID: 74849092532     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1315245.1315283     Document Type: Conference Paper
Times cited : (14)

References (35)
  • 3
    • 26444478592 scopus 로고    scopus 로고
    • RFID traceability: A multilayer problem
    • A. Patrick and M. Yung, editors, of LNCS, Springer
    • G. Avoine and P. Oechslin. RFID traceability: A multilayer problem. In A. Patrick and M. Yung, editors, Proceedings of Financial Cryptography 2005, volume 3570 of LNCS, pages 125-140. Springer, 2005.
    • (2005) Proceedings of Financial Cryptography 2005 , vol.3570 , pp. 125-140
    • Avoine, G.1    Oechslin, P.2
  • 5
    • 84957868624 scopus 로고    scopus 로고
    • An information-theoretic model for steganography
    • D. Aucsmith, editor, of LNCS, Springer
    • C. Cachin. An information-theoretic model for steganography. In D. Aucsmith, editor, Proceedings of Information Hiding 1998, volume 1525 of LNCS, pages 306-318. Springer, 1998.
    • (1998) Proceedings of Information Hiding 1998 , vol.1525 , pp. 306-318
    • Cachin, C.1
  • 6
    • 84948973494 scopus 로고    scopus 로고
    • Exposure-resilient functions and all-or-nothing transforms
    • B. Preneel, editor, of LNCS, Springer
    • R. Canetti, Y. Dodis, S. Halevi, E. Kushilevitz, and A. Sahai. Exposure-resilient functions and all-or-nothing transforms. In B. Preneel, editor, Proceedings of Eurocrypt 2000, volume 1807 of LNCS, pages 453-469. Springer, 2000.
    • (2000) Proceedings of Eurocrypt 2000 , vol.1807 , pp. 453-469
    • Canetti, R.1    Dodis, Y.2    Halevi, S.3    Kushilevitz, E.4    Sahai, A.5
  • 7
    • 33750067964 scopus 로고    scopus 로고
    • Auditable privacy: On tamper-evident mix networks
    • G. D. Crescenzo and A. Rubin, editors, of LNCS, Springer
    • J. Y. Choi, P. Golle, and M. Jakobsson. Auditable privacy: On tamper-evident mix networks. In G. D. Crescenzo and A. Rubin, editors, Proceedings of Financial Cryptography 2006, volume 4107 of LNCS, pages 126-141. Springer, 2006.
    • (2006) Proceedings of Financial Cryptography 2006 , vol.4107 , pp. 126-141
    • Choi, J.Y.1    Golle, P.2    Jakobsson, M.3
  • 11
    • 84937438364 scopus 로고    scopus 로고
    • Provably secure steganography
    • M. Yung, editor, of LNCS, Springer
    • N. Hopper, J. Langford, and L. von Ahn. Provably secure steganography. In M. Yung, editor, Proceedings of Crypto 2002, volume 2442 of LNCS, pages 77-92. Springer, 2002.
    • (2002) Proceedings of Crypto 2002 , vol.2442 , pp. 77-92
    • Hopper, N.1    Langford, J.2    Von Ahn, L.3
  • 12
    • 77952392875 scopus 로고    scopus 로고
    • E. Inc. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. Referenced 2007 at
    • E. Inc. Class 1 generation 2 UHF air interface protocol standard version 1.0.9. Referenced 2007 at http://www.epcglobalinc.com/standards-technology/ EPCglobalClass-1Generation-2UHFRFIDProtocolV109pdf.
  • 13
    • 20844453821 scopus 로고    scopus 로고
    • Minimalist cryptography for RFID tags
    • A. Juels. Minimalist cryptography for RFID tags. In SCN '04, pages 149-164, 2004.
    • (2004) SCN '04 , pp. 149-164
    • Juels, A.1
  • 14
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • February
    • A. Juels. RFID security and privacy: A research survey. J-SAC, 24 (2):381-394, February 2006.
    • (2006) J-SAC , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 15
    • 20844459862 scopus 로고    scopus 로고
    • RFID privacy: An overview of problems and proposed solutions
    • May/June
    • A. Juels, S. Garfinkel, and R. Pappu. RFID privacy: An overview of problems and proposed solutions. IEEE Security and Privacy, 3 (3):34-43, May/June 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.3 , pp. 34-43
    • Juels, A.1    Garfinkel, S.2    Pappu, R.3
  • 16
    • 77952361468 scopus 로고    scopus 로고
    • RSA key generation with verifiable randomness
    • D. Naccache and P. Paillier, editors, of LNCS, Springer
    • A. Juels and J. Guajardo. RSA key generation with verifiable randomness. In D. Naccache and P. Paillier, editors, Proceedings of PKC 2002, volume 2274 of LNCS, pages 72-86. Springer, 2002.
    • (2002) Proceedings of PKC 2002 , vol.2274 , pp. 72-86
    • Juels, A.1    Guajardo, J.2
  • 17
    • 18744409344 scopus 로고    scopus 로고
    • The blocker tag: Selective blocking of RFID tags for consumer privacy
    • V. Atluri, editor, ACM Press
    • A. Juels, R. Rivest, and M. Szydlo. The blocker tag: Selective blocking of RFID tags for consumer privacy. In V. Atluri, editor, Proceedings of ACM CCS 2003, pages 103-111. ACM Press, 2003.
    • (2003) Proceedings of ACM CCS 2003 , pp. 103-111
    • Juels, A.1    Rivest, R.2    Szydlo, M.3
  • 18
    • 33144459893 scopus 로고    scopus 로고
    • High-power proxies for enhancing RFID privacy and utility
    • G. Danezis and D. Martin, editors
    • A. Juels, P. Syverson, and D. Bailey. High-power proxies for enhancing RFID privacy and utility. In G. Danezis and D. Martin, editors, Privacy Enhancing Technologies (PET), 2005.
    • (2005) Privacy Enhancing Technologies (PET)
    • Juels, A.1    Syverson, P.2    Bailey, D.3
  • 20
    • 84943632039 scopus 로고    scopus 로고
    • Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems
    • N. Koblitz, editor, of LNCS, Springer
    • P. Kocher. Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS, pages 104-113. Springer, 1996.
    • (1996) Proceedings of Crypto 1996 , vol.1109 , pp. 104-113
    • Kocher, P.1
  • 21
    • 33748680791 scopus 로고    scopus 로고
    • Collusion-free protocols
    • H. Gabow and R. Fagin, editors, ACM
    • M. Lepinski, S. Micali, and A. Shelat. Collusion-free protocols. In H. Gabow and R. Fagin, editors, Proceedings of STOC 2005, pages 543-552. ACM, 2005.
    • (2005) Proceedings of STOC 2005 , pp. 543-552
    • Lepinski, M.1    Micali, S.2    Shelat, A.3
  • 22
    • 33749013010 scopus 로고    scopus 로고
    • Privacy for RFID through trusted computing (short paper)
    • S. D. C. di Vimercati and R. Dingledine, editors
    • D. Molnar, A. Soppera, and D. Wagner. Privacy for RFID through trusted computing (short paper). In S. D. C. di Vimercati and R. Dingledine, editors, Proceedings of WPES, 2005.
    • (2005) Proceedings of WPES
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 23
    • 33745597876 scopus 로고    scopus 로고
    • A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags
    • B. Preneel and S. Tavares, editors, LNCS. Springer
    • D. Molnar, A. Soppera, and D. Wagner. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags. In B. Preneel and S. Tavares, editors, SAC '05, LNCS. Springer, 2005.
    • (2005) SAC '05
    • Molnar, D.1    Soppera, A.2    Wagner, D.3
  • 24
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • B. Pfitzmann and P. McDaniel, editors, ACM Press
    • D. Molnar and D. Wagner. Privacy and security in library RFID: Issues, practices, and architectures. In B. Pfitzmann and P. McDaniel, editors, Proceedings of ACM CCS 2004, pages 210-219. ACM Press, 2004.
    • (2004) Proceedings of ACM CCS 2004 , pp. 210-219
    • Molnar, D.1    Wagner, D.2
  • 25
    • 77952345517 scopus 로고    scopus 로고
    • Elliptic curves and MRTDs
    • Slide presentation
    • K. Nguyen. Elliptic curves and MRTDs. In Interfest Singapore, 2005. Slide presentation.
    • (2005) Interfest Singapore
    • Nguyen, K.1
  • 27
    • 26444435642 scopus 로고    scopus 로고
    • RFID guardian: A battery-powered mobile device for RFID privacy management
    • C. Boyd and J. M. González Nieto, editors, of LNCS, Springer
    • M. Rieback, B. Crispo, and A. Tanenbaum. RFID Guardian: A battery-powered mobile device for RFID privacy management. In C. Boyd and J. M. González Nieto, editors, ACISP '05, volume 3574 of LNCS, pages 184-194. Springer, 2005.
    • (2005) ACISP '05 , vol.3574 , pp. 184-194
    • Rieback, M.1    Crispo, B.2    Tanenbaum, A.3
  • 29
    • 13444297889 scopus 로고    scopus 로고
    • Towards the five-cent tag
    • MIT Auto ID Center
    • S. Sarma. Towards the five-cent tag. Technical Report MIT-AUTOID-WH-006, MIT Auto ID Center, 2001. Available from http://www.epcglobalinc.org.
    • (2001) Technical Report MIT-AUTOID-WH-006
    • Sarma, S.1
  • 30
    • 2942593615 scopus 로고    scopus 로고
    • Radio-frequency identification systems
    • B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, of LNCS, Springer
    • S. E. Sarma, S. A. Weis, and D. Engels. Radio-frequency identification systems. In B. S. Kaliski Jr., Ç. K. Koç, and C. Paar, editors, Workshop on Cryptographic Hardware and Embedded Systems - CHES '02, volume 2523 of LNCS, pages 454-469. Springer, 2002.
    • (2002) Workshop on Cryptographic Hardware and Embedded Systems - CHES '02 , vol.2523 , pp. 454-469
    • Sarma, S.E.1    Weis, S.A.2    Engels, D.3
  • 31
    • 0001217738 scopus 로고
    • The prisoners' problem and the subliminal channel
    • D. Chaum, editor, Plenum Press
    • G. Simmons. The prisoners' problem and the subliminal channel. In D. Chaum, editor, Proceedings of Crypto 1983, pages 51-67. Plenum Press, 1983.
    • (1983) Proceedings of Crypto 1983 , pp. 51-67
    • Simmons, G.1
  • 32
    • 84985824882 scopus 로고
    • The subliminal channel and digital signatures
    • T. Beth, N. Cot, and I. Ingemarsson, editors, of LNCS, Springer
    • G. Simmons. The subliminal channel and digital signatures. In T. Beth, N. Cot, and I. Ingemarsson, editors, Proceedings of Eurocrypt 1984, volume 0209 of LNCS, pages 364-378. Springer, 1984.
    • (1984) Proceedings of Eurocrypt 1984 , vol.209 , pp. 364-378
    • Simmons, G.1
  • 33
    • 84978194862 scopus 로고
    • Subliminal communication is easy using the DSA
    • T. Helleseth, editor, of LNCS, Springer
    • G. Simmons. Subliminal communication is easy using the DSA. In T. Helleseth, editor, Proceedings of Eurocrypt 1993, volume 765 of LNCS, pages 218-232. Springer, 1993.
    • (1993) Proceedings of Eurocrypt 1993 , vol.765 , pp. 218-232
    • Simmons, G.1
  • 34
    • 84955586344 scopus 로고    scopus 로고
    • The dark side of black-box cryptography, or: Should we trust capstone?
    • N. Koblitz, editor, of LNCS. Springer
    • A. Young and M. Yung. The dark side of black-box cryptography, or: Should we trust capstone? In N. Koblitz, editor, Proceedings of Crypto 1996, volume 1109 of LNCS. Springer, 1996.
    • (1996) Proceedings of Crypto 1996 , vol.1109
    • Young, A.1    Yung, M.2
  • 35
    • 84957360674 scopus 로고    scopus 로고
    • Kleptography: Using cryptography against cryptography
    • W. Fumy, editor, of LNCS. Springer
    • A. Young and M. Yung. Kleptography: Using cryptography against cryptography. In W. Fumy, editor, Proceedings of Eurocrypt 1993, volume 1233 of LNCS. Springer, 1997.
    • (1997) Proceedings of Eurocrypt 1993 , vol.1233
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.