Abstract
RFID technology is becoming more useful and it is applied in various domains such as inventory management, supply chain, logistics, control access, e-passport, e-health and many other applications. Proposing an authentication protocol for RFID systems must find a compromise between the limitation of resources and the security requirements. In this paper, we propose two Zero-Knowledge mutual authentication protocols for the first time based on error correcting codes which are supposed to be resistant to quantum computer. Our proposed schemes have many advantages in terms of the approach used in the definition of the protocols and in terms of security properties and performances. Besides all the standard security requirements that our schemes fulfill, an adversary who can compromise the Reader cannot get the identifier of the Tag. We achieve this by using a Zero-Knowledge identification protocol.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chen, C.L., Lai, Y.L., Chen, C.C., Deng, Y.Y., Hwang, Y.C.: RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards. Int. J. Netw. Secur. 13, 41–48 (2011)
Khedr, W.: On the security of moessner’s and khan’s authentication scheme for passive EPCglobal C1G2 RFID Zero-Knowledges. Int. J. Netw. Secur. 16(5), 369–375 (2014)
Naveed, M., Habib, W., Masud, U., Ullah, U., Ahmad, G.: Reliable and low cost RFID based authentication system for large scale deployment. Int. J. Netw. Secur. 14, 173–179 (2012)
Wei, C.H., Hwang, M.S., Chin, A.Y.H.: An authentication protocol for low-cost RFID Tags. Int. J. Mob. Commun. 9(2), 208–223 (2011)
Chien, H.Y.: Secure access control schemes for RFID systems with anonymity. In: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, pp. 96–100 (2006)
Cao, T., Shen, P.: Cryptanalysis of two RFID authentication protocols. Int. J. Netw. Secur. 9, 95–100 (2009)
Chikouche, N., Cherif, F., Cayrel, P.-L., Benmohammed, M.: Weaknesses in two RFID authentication protocols. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E.M. (eds.) C2SI 2015. LNCS, vol. 9084, pp. 162–172. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18681-8_13
Cui, Y., Kobara, K., Matsuura, K., Imai, H.: Lightweight asymmetric privacy-preserving authentication protocols secure against active attack. In: Proceedings of the Fifth Annual IEEE International Conference (PerComW 2007), White Plains, NY, USA, pp. 223–228 (2007)
Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for lowcost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)
Malek, B., Miri, A.: Lightweight mutual RFID authentication. In: Proceedings of IEEE International Conference on Communications, Ottawa, ON, Canada, pp. 868–872 (2012)
Li, Z., Zhang, R., Yang, Y., Li, Z.: A provable secure mutual RFID authentication protocol based on error-correct code. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, pp. 73–78. IEEE (2014)
Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: A secure code-based authentication scheme for RFID systems. Int. J. Comput. Netw. Inf. Secur. 7, 1–9 (2015)
Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: Improved RFID authentication protocol based on randomized McEliece cryptosystem. Int. J. Netw. Secur. 17, 413–422 (2015)
El Moustaine, E., Laurent, M.: GPS+: a back-end coupons identification for low-cost RFID. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2013, Budapest, Hungary, pp. 73–78 (2013)
Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_1
Aguilar Melchor, C., Gaborit, P., Schrek, J.: A new Zero-Knowledge code based identification scheme with reduced communication. In: 2011 IEEE Information Theory Workshop, pp. 648–652. IEEE Press, Paraty (2011)
Liu, Z., Zhang, W., Wu, C.: A lightweight code-based authentication protocol for RFID systems. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 114–128. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48683-2_11
Berlekamp, E.R., McEliece, R.J., Van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)
Stern, J.: A method for finding codewords of small weight. In: Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106–113. Springer, Heidelberg (1989). https://doi.org/10.1007/BFb0019850
Peeters, R., Hermans, J.: Wide strong private RFID identification based on Zero-Knowledge. IACR Cryptol. ePrint Arch. 2012, 389 (2012)
Assidi, H., Ayebie, E.B., Souidi, E.M.: A code-based group signature scheme with shorter public key length. In: ICETE 2016, SECRYPT, vol. 4, pp. 432–439. SciTePress, Lisbon, Portugal, July 2016
Ayebie, B.E., Assidi, H., Souidi, E.M.: A new dynamic code-based group signature scheme. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds.) C2SI 2017. LNCS, vol. 10194, pp. 346–364. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55589-8_23
Aguilar Melchor, C., Cayrel, P.-L., Gaborit, P.: A new efficient threshold ring signature scheme based on coding theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 1–16. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3_1
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this paper
Cite this paper
Assidi, H., Ayebie, E.B., Souidi, E.M. (2018). Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. In: Kim, H., Kim, DC. (eds) Information Security and Cryptology – ICISC 2017. ICISC 2017. Lecture Notes in Computer Science(), vol 10779. Springer, Cham. https://doi.org/10.1007/978-3-319-78556-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-78556-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-78555-4
Online ISBN: 978-3-319-78556-1
eBook Packages: Computer ScienceComputer Science (R0)