Quantifying Information Leakage in Tree-Based Hash Protocols (Short Paper)
نویسندگان
چکیده
Radio Frequency Identification (RFID) systems promise large scale, automated tracking solutions but also pose a threat to customer privacy. The tree-based hash protocol proposed by Molnar and Wagner presents a scalable, privacy-preserving solution. Previous analyses of this protocol concluded that an attacker who can extract secrets from a large number of tags can compromise privacy of other tags. We propose a new metric for information leakage inRFIDprotocols alongwith a threatmodel that more realistically captures the goals and capabilities of potential attackers. Using this metric, we measure the information leakage in the treebased hash protocol and estimate an attacker’s probability of success in tracking targeted individuals, considering scenarios in which multiple information sources can be combined to track an individual. We conclude that an attacker has a reasonable chance of tracking tags when the treebased hash protocol is used.
منابع مشابه
Quantifying Information Leakage in Tree-Based Hash Protocols
Radio Frequency Identification (RFID) systems promise large scale, automated tracking solutions but also pose a threat to customer privacy. The tree-based hash protocol proposed by Molnar and Wagner presents a scalable, privacy-preserving solution. Previous analyses of this protocol concluded that an attacker who can extract secrets from a large number of tags can compromise privacy of other ta...
متن کاملMinimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear...
متن کاملReasoning about Belief in Cryptographic Protocols
Analysis methods for cryptographic protocols have often focused on information leakage rather than on seeing whether a protocol meets its goals. Many protocols, however, fall far short of meeting their goals, sometimes for quite subtle reasons. We introduce a mechanism for reasoning about belief as a systematic way to understand the working of cryptographic protocols. Our mechanism captures mor...
متن کاملShort signature from factoring assumption in the standard model
Programmable hash functions (PHFs) is a new cryptographic primitive, which can mimic certain programmability properties of random oracles. Due to these properties, PHFs are very useful to construct short signatures in standard models. Based on (m,1)-PHF, we propose an efficient construction of short signature from factoring problem. Our signature doesn’t require the generation of primes at sign...
متن کاملStructural signatures for tree data structures
Data sharing with multiple parties over a third-party distribution framework requires that both data integrity and confidentiality be assured. One of the most widely used data organization structures is the tree structure. When such structures encode sensitive information (such as in XML documents), it is crucial that integrity and confidentiality be assured not only for the content, but also f...
متن کامل