DocumentCode
652195
Title
A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption
Author
Mamun, Mohammad Saiful Islam ; Miyaji, Atsuko
Author_Institution
Japan Adv. Inst. of Sci. & Technol. (JAIST), Ishikawa, Japan
fYear
2013
fDate
16-18 July 2013
Firstpage
102
Lastpage
109
Abstract
In the recent years, several light-weight cryptographic solutions have been proposed for RFID system. HB-family is one of promising protocol series, based on the hardness of the Learning Parity with Noise (LPN) problem. Most protocols in HB-family are not suited for mobile/wireless reader applications due to secure channel assumptions. In this paper, we present a fully secure collaborative mutual authentication protocol for an RFID system where both channels tag-reader and reader-server are considered to be insecure. More precisely, we introduce a new variant of an HB-like protocol where the complete RFID system is authenticated under LPN-based commitment scheme by taking advantages of properties of perfect computational hiding commitment scheme, pseudo inverse matrix, and randomized Hill cipher. In addition, through detailed security and privacy analysis, we show that our scheme achieves required security and privacy properties, under not the random oracle model, but the standard model.
Keywords
cryptographic protocols; data privacy; radiofrequency identification; telecommunication security; HB-family; LPN problem; LPN-based commitment scheme; RFID system; channel assumption security; channel reader-server; channel tag-reader; exact LPN assumption; fully-secure RFID authentication protocol; fully-secure collaborative mutual authentication protocol; learning parity-noise problem; light-weight cryptographic solution; mobile-wireless reader application; perfect computational hiding commitment scheme; privacy analysis; pseudoinverse matrix; randomized Hill cipher; security analysis; Authentication; Protocols; Radiofrequency identification; Servers; Silicon; Vectors; Hill cipher; Mutual authentication; exact LPN problem; pseudo-inverse matrix;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.17
Filename
6680829
Link To Document