Anonymity for key-trees with adaptive adversaries

Michael Beye*, Thijs Veugen

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Abstract

Hash-lock authentication protocols for Radio Frequency IDentification (RFID) tags incur heavy search on the server. Key-trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán [4] and Beye and Veugen [3] devised trees to withstand such attacks, but assumed adversaries to be non-adaptive, without access to side-channel information. We illustrate how in practice, side-channel information can be used to attack the system. We also describe adaptive attacks that are easy to mount and will significantly reduce tag anonymity. Theoretical analysis of the implications on anonymity in key-trees leads to new requirements and a new tree construction. Simulation is used to test its performance, the results showing an improved resistance to adaptive attacks.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks
Subtitle of host publication7th International ICST Conference, SecureComm 2011, London, September 7-9, 2011, Revised Selected Papers
EditorsMuttukrishnan Rajarajan, Fred Piper, Haining Wang, George Kesidis
Place of PublicationBerlin, Heidelberg
PublisherSpringer
Pages409-425
Number of pages17
ISBN (Electronic)978-3-642-31909-9
ISBN (Print)978-3-642-31908-2
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011 - London, United Kingdom
Duration: 7 Sept 20119 Sept 2011
Conference number: 7

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
PublisherSpringer
Volume96
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011
Abbreviated titleSecureComm 2011
Country/TerritoryUnited Kingdom
CityLondon
Period7/09/119/09/11

Keywords

  • Adaptive adversaries
  • Anonymity
  • Anonymity set
  • Hash-lock protocol
  • Key-tree
  • RFID
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Anonymity for key-trees with adaptive adversaries'. Together they form a unique fingerprint.

Cite this