Abstract
A Radio-Frequency-Identification (RFID) tag is a small and cheap device which is combined in IC chip and an antenna for radio communications. It emits an ID in response to a query from a radio communication device called as a reader. For this reason, the RFID tag is used for management of goods and it is used as a substitute for a bar code. However, RFID system may infringe on a consumer’s privacy because it has a strong tracing ability. Although ID of a RFID tag can be encrypted, it is possible to pursue an object by tracing specific information. Therefore, we discuss the privacy protection using universal re-encryption proposed by Golle, Jakobsson, Juels and Syverson. Since the system does not protect a modification of the information on RFID tags, it can be exploited by an attacker. Therefore we point out two attacks using modification of the information on RFID tags. Moreover, we offer two proposed schemes for addressing the problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Juels, A.: Privacy and Authentication in Low-Cost RFID Tags. In submission (2003), http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/index.html
Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 103–121. Springer, Heidelberg (2003)
Sarma, S.E., Weis, S.A., Engels, D.W.: RFID systems, security and privacy implications. Technical Report MIT-AUTO-WH-014, AutoID Center, MIT (2002)
Sarma, S.E., Weis, S.A., Engels, D.W.: Radio-frequency-identification security risks and challenges. Security Bytes 6(1) (2003)
Weis, S.A., Sarma, S., Rivest, R., Engels, D.: Security and privacy aspects of low-cost radio frequency identification systems. In: First International Conference on Security in Pervasive Computing (2003) (to appear), http://citeseer.nj.nec.com/weis03security.html
Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: submission (2003), http://www.rsasecurity.com/rsalabs/staff/bios/ajuels/index.html
Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal re-encryption for mixnets. To be presented at RSA (2004), Cryptographer’s Track, http://crypto.stanford.edu/~pgolle/
Finkerseller. K.: RFID Handbook, Carl Hanser Verlag Munchen (September 2002)
McCullagh, D.: RFID tags: Big Brother in small pachkages. CNet, January 13 (2003), Available at http://news.com.com/2010-1069-980325.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Saito, J., Ryou, JC., Sakurai, K. (2004). Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds) Embedded and Ubiquitous Computing. EUC 2004. Lecture Notes in Computer Science, vol 3207. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30121-9_84
Download citation
DOI: https://doi.org/10.1007/978-3-540-30121-9_84
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22906-3
Online ISBN: 978-3-540-30121-9
eBook Packages: Springer Book Archive