DocumentCode :
652195
Title :
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption
Author :
Mamun, Mohammad Saiful Islam ; Miyaji, Atsuko
Author_Institution :
Japan Adv. Inst. of Sci. & Technol. (JAIST), Ishikawa, Japan
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
102
Lastpage :
109
Abstract :
In the recent years, several light-weight cryptographic solutions have been proposed for RFID system. HB-family is one of promising protocol series, based on the hardness of the Learning Parity with Noise (LPN) problem. Most protocols in HB-family are not suited for mobile/wireless reader applications due to secure channel assumptions. In this paper, we present a fully secure collaborative mutual authentication protocol for an RFID system where both channels tag-reader and reader-server are considered to be insecure. More precisely, we introduce a new variant of an HB-like protocol where the complete RFID system is authenticated under LPN-based commitment scheme by taking advantages of properties of perfect computational hiding commitment scheme, pseudo inverse matrix, and randomized Hill cipher. In addition, through detailed security and privacy analysis, we show that our scheme achieves required security and privacy properties, under not the random oracle model, but the standard model.
Keywords :
cryptographic protocols; data privacy; radiofrequency identification; telecommunication security; HB-family; LPN problem; LPN-based commitment scheme; RFID system; channel assumption security; channel reader-server; channel tag-reader; exact LPN assumption; fully-secure RFID authentication protocol; fully-secure collaborative mutual authentication protocol; learning parity-noise problem; light-weight cryptographic solution; mobile-wireless reader application; perfect computational hiding commitment scheme; privacy analysis; pseudoinverse matrix; randomized Hill cipher; security analysis; Authentication; Protocols; Radiofrequency identification; Servers; Silicon; Vectors; Hill cipher; Mutual authentication; exact LPN problem; pseudo-inverse matrix;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.17
Filename :
6680829
Link To Document :
بازگشت