Improved anonymity for key-trees

Thijs Veugen*, Michael Beye

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Abstract

Randomized hash-lock protocols for Radio Frequency IDentification (RFID) tags offer forward untraceability, but incur heavy search on the server. Key trees have been proposed as a way to reduce search times, but because partial keys in such trees are shared, key compromise affects several tags. Buttyán et al. have defined measures for the resulting loss of anonymity in the system, and approximated their measures by means of simulations. We will further improve upon their trees, and provide a proof of optimality. Finally, an efficient recursive algorithm is presented to compute the anonymity measures.

Original languageEnglish
Title of host publicationRadio Frequency Identification: Security and Privacy Issues
Subtitle of host publication8th International Workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2-3, 2012, Revised Selected Papers
Place of PublicationBerlin, Heidelberg
PublisherSpringer
Pages31-47
Number of pages17
ISBN (Electronic)978-3-642-36140-1
ISBN (Print)978-3-642-36139-5
DOIs
Publication statusPublished - 2013
Externally publishedYes
Event8th International Workshop on Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012 - Nijmegen, Netherlands
Duration: 2 Jul 20123 Jul 2012
Conference number: 8

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume7739
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Workshop on Radio Frequency Identification: Security and Privacy Issues, RFIDSec 2012
Abbreviated titleRFIDSec 2012
Country/TerritoryNetherlands
CityNijmegen
Period2/07/123/07/12

Keywords

  • Anonymity
  • Anonymity set
  • Authentication delay
  • Hash-lock protocol
  • Key-tree
  • RFID
  • n/a OA procedure

Fingerprint

Dive into the research topics of 'Improved anonymity for key-trees'. Together they form a unique fingerprint.

Cite this