Privacy Protection for RFID with Hidden Subset Identifiers

  • Jacek Cichoń
  • Marek Klonowski
  • Mirosław Kutyłowski
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5013)


We propose very simple and cheap but nevertheless effective protection against privacy threats for RFID-tags. For the hidden subset RFID-tags proposed in this paper, the ID string presented by an RFID-tag evolves rapidly. It is is not the bit value that enables one to recognize a tag. Instead, a reader detects some invariant properties that are hard to be recognized by a curious illegitimate reader.

The solution is not based on any cryptographic primitive, it relies only on properties of random sets and on linear mappings between vector spaces. The solution proposed is well suited for low-end devices, since all mechanisms can be easily implemented by circuits of a small size.


Privacy Protection Dependent Part Read Operation Legitimate User Random Part 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ateniese, G., Camenisch, J., de Medeiros, B.: Untracable RFID Tags via Insubvertible Encryption. In: 12th ACM CCS 2005, pp. 92–101. ACM Press, New York (2005)Google Scholar
  2. 2.
    Blömer, J., Karp, R., Welzl, E.: The Rank of Sparse Random Matrices over Finite Fields. Random Structures and Algorithms 10(4), 407–419 (1997)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Cichoń, J., Klonowski, M., Kutyłowski, M.: Privacy Protection in Dynamic Systems Based on RFID Tags. In: 4th IEEE International Workshop on Pervasive Computing and Communication Security, Proceedings of PERCOM 2007 Workshops, pp. 235–240. IEEE Computer Society, Los Alamitos (2007)Google Scholar
  4. 4.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  5. 5.
    Juels, A.: Yoking-Proofs for RFID Tags. In: Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, p. 138. IEEE Computer Society Press, Los Alamitos (2004)CrossRefGoogle Scholar
  6. 6.
    Juels, A.: RFID privacy: A Technical Primer for the Non-Technical Reader. In: Privacy and Technologies of Identity: A Cross-Disciplinary Conversation, Springer, Heidelberg (2005), available from: Google Scholar
  7. 7.
    Juels, A., Pappu, R.: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security and Privacy 3(3), 34–43 (2005)CrossRefGoogle Scholar
  8. 8.
    Juels, A., Rivest, R.L., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: 10th ACM CCS 2003, pp. 103–111. ACM Press, New York (2003)Google Scholar
  9. 9.
    Molnar, D., Wagner, D.: Privacy and Security in Library RFID Issues, Practices and Architectures. In: 11th ACM CCS 2004, pp. 210–219. ACM Press, New York (2004)Google Scholar
  10. 10.
    Moskowitz, P.A., Lauris, A., Morris, S.S.: A Privacy Enhancing Radio Frequency Identification Tag: Implementation of the Clipped Tag. In: PerTec 2007, Proceedings of PERCOM 2007 Workshops, pp. 348–351. IEEE Computer Society Press, Los Alamitos (2007)Google Scholar
  11. 11.
    Langheinrich, M.: A Survey of RFID Privacy Approaches. In: Workshop on Ubicomp Privacy - Technologies, Users, Policy. Workshop at Ubicomp 2007 (2007), available from:
  12. 12.
    Langheinrich, M.: RFID and Privacy. In: Security, Privacy, and Trust in Modern Data Management, Springer, Heidelberg (2007)Google Scholar
  13. 13.
    Rivest, R.L.: Chaffing and Winnowing: Confidentiality without Encryption,
  14. 14.
    Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 201–212. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Jacek Cichoń
    • 1
  • Marek Klonowski
    • 1
  • Mirosław Kutyłowski
    • 1
  1. 1.Institute of Mathematics and Computer ScienceWrocław University of TechnologyWrocławPoland

Personalised recommendations