Skip to main content

Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10779))

Abstract

RFID technology is becoming more useful and it is applied in various domains such as inventory management, supply chain, logistics, control access, e-passport, e-health and many other applications. Proposing an authentication protocol for RFID systems must find a compromise between the limitation of resources and the security requirements. In this paper, we propose two Zero-Knowledge mutual authentication protocols for the first time based on error correcting codes which are supposed to be resistant to quantum computer. Our proposed schemes have many advantages in terms of the approach used in the definition of the protocols and in terms of security properties and performances. Besides all the standard security requirements that our schemes fulfill, an adversary who can compromise the Reader cannot get the identifier of the Tag. We achieve this by using a Zero-Knowledge identification protocol.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Chen, C.L., Lai, Y.L., Chen, C.C., Deng, Y.Y., Hwang, Y.C.: RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards. Int. J. Netw. Secur. 13, 41–48 (2011)

    Google Scholar 

  2. Khedr, W.: On the security of moessner’s and khan’s authentication scheme for passive EPCglobal C1G2 RFID Zero-Knowledges. Int. J. Netw. Secur. 16(5), 369–375 (2014)

    Google Scholar 

  3. Naveed, M., Habib, W., Masud, U., Ullah, U., Ahmad, G.: Reliable and low cost RFID based authentication system for large scale deployment. Int. J. Netw. Secur. 14, 173–179 (2012)

    Google Scholar 

  4. Wei, C.H., Hwang, M.S., Chin, A.Y.H.: An authentication protocol for low-cost RFID Tags. Int. J. Mob. Commun. 9(2), 208–223 (2011)

    Article  Google Scholar 

  5. Chien, H.Y.: Secure access control schemes for RFID systems with anonymity. In: Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), Nara, Japan, pp. 96–100 (2006)

    Google Scholar 

  6. Cao, T., Shen, P.: Cryptanalysis of two RFID authentication protocols. Int. J. Netw. Secur. 9, 95–100 (2009)

    Google Scholar 

  7. Chikouche, N., Cherif, F., Cayrel, P.-L., Benmohammed, M.: Weaknesses in two RFID authentication protocols. In: El Hajji, S., Nitaj, A., Carlet, C., Souidi, E.M. (eds.) C2SI 2015. LNCS, vol. 9084, pp. 162–172. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-18681-8_13

    Google Scholar 

  8. Cui, Y., Kobara, K., Matsuura, K., Imai, H.: Lightweight asymmetric privacy-preserving authentication protocols secure against active attack. In: Proceedings of the Fifth Annual IEEE International Conference (PerComW 2007), White Plains, NY, USA, pp. 223–228 (2007)

    Google Scholar 

  9. Chien, H.Y., Laih, C.S.: ECC-based lightweight authentication protocol with untraceability for lowcost RFID. J. Parallel Distrib. Comput. 69, 848–853 (2009)

    Article  Google Scholar 

  10. Malek, B., Miri, A.: Lightweight mutual RFID authentication. In: Proceedings of IEEE International Conference on Communications, Ottawa, ON, Canada, pp. 868–872 (2012)

    Google Scholar 

  11. Li, Z., Zhang, R., Yang, Y., Li, Z.: A provable secure mutual RFID authentication protocol based on error-correct code. In: Proceedings of International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, Shanghai, China, pp. 73–78. IEEE (2014)

    Google Scholar 

  12. Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: A secure code-based authentication scheme for RFID systems. Int. J. Comput. Netw. Inf. Secur. 7, 1–9 (2015)

    MATH  Google Scholar 

  13. Chikouche, N., Foudil, C., Cayrel, P.L., Benmohammed, M.: Improved RFID authentication protocol based on randomized McEliece cryptosystem. Int. J. Netw. Secur. 17, 413–422 (2015)

    MATH  Google Scholar 

  14. El Moustaine, E., Laurent, M.: GPS+: a back-end coupons identification for low-cost RFID. In: Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, WISEC 2013, Budapest, Hungary, pp. 73–78 (2013)

    Google Scholar 

  15. Deng, R.H., Li, Y., Yung, M., Zhao, Y.: A new framework for RFID privacy. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 1–18. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15497-3_1

    Chapter  Google Scholar 

  16. Aguilar Melchor, C., Gaborit, P., Schrek, J.: A new Zero-Knowledge code based identification scheme with reduced communication. In: 2011 IEEE Information Theory Workshop, pp. 648–652. IEEE Press, Paraty (2011)

    Google Scholar 

  17. Liu, Z., Zhang, W., Wu, C.: A lightweight code-based authentication protocol for RFID systems. In: Niu, W., Li, G., Liu, J., Tan, J., Guo, L., Han, Z., Batten, L. (eds.) ATIS 2015. CCIS, vol. 557, pp. 114–128. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-48683-2_11

    Chapter  Google Scholar 

  18. Berlekamp, E.R., McEliece, R.J., Van Tilborg, H.C.: On the inherent intractability of certain coding problems. IEEE Trans. Inf. Theory 24(3), 384–386 (1978)

    Article  MathSciNet  MATH  Google Scholar 

  19. Stern, J.: A method for finding codewords of small weight. In: Cohen, G., Wolfmann, J. (eds.) Coding Theory 1988. LNCS, vol. 388, pp. 106–113. Springer, Heidelberg (1989). https://doi.org/10.1007/BFb0019850

    Chapter  Google Scholar 

  20. Peeters, R., Hermans, J.: Wide strong private RFID identification based on Zero-Knowledge. IACR Cryptol. ePrint Arch. 2012, 389 (2012)

    Google Scholar 

  21. Assidi, H., Ayebie, E.B., Souidi, E.M.: A code-based group signature scheme with shorter public key length. In: ICETE 2016, SECRYPT, vol. 4, pp. 432–439. SciTePress, Lisbon, Portugal, July 2016

    Google Scholar 

  22. Ayebie, B.E., Assidi, H., Souidi, E.M.: A new dynamic code-based group signature scheme. In: El Hajji, S., Nitaj, A., Souidi, E.M. (eds.) C2SI 2017. LNCS, vol. 10194, pp. 346–364. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55589-8_23

    Chapter  Google Scholar 

  23. Aguilar Melchor, C., Cayrel, P.-L., Gaborit, P.: A new efficient threshold ring signature scheme based on coding theory. In: Buchmann, J., Ding, J. (eds.) PQCrypto 2008. LNCS, vol. 5299, pp. 1–16. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-88403-3_1

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hafsa Assidi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Assidi, H., Ayebie, E.B., Souidi, E.M. (2018). Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems. In: Kim, H., Kim, DC. (eds) Information Security and Cryptology – ICISC 2017. ICISC 2017. Lecture Notes in Computer Science(), vol 10779. Springer, Cham. https://doi.org/10.1007/978-3-319-78556-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-78556-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-78555-4

  • Online ISBN: 978-3-319-78556-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics