Scalable and Flexible Privacy Protection Scheme for RFID Systems

  • Sang-Soo Yeo
  • Sung Kwon Kim
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3813)


Radio Frequency Identification (RFID) system has been studied so much and it may be applicable to various fields. RFID system, however, still has consumer privacy problems under the limitation of low-cost tag implementation. We propose an efficient privacy protection scheme using two hash functions in the tag. We show that our scheme satisfies not only privacy and location history protection of consumers, but also scalability and flexibility of back-end servers. Additionally, we present a practical example to compare performance of several schemes.


Hash Function Main Scheme Secret Data Secure Channel Hash Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Cryptographic Approach to “Privacy-Friendly” Tags. In: RFID Privacy Workshop, November 2003. MIT, Cambridge (2003)Google Scholar
  2. 2.
    Juels, A., Pappu, R.: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. In: Financial Cryptography 2003 (2003)Google Scholar
  3. 3.
    Weis, S., Sarma, S., Rivest, R., Engels, D.: Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing (2003)Google Scholar
  4. 4.
    Feldhofer, M.: A Proposal for Authentication Protocol in A Security Layer for RFID Smart Tags. In: IEEE MELECON 2004, May 2004, vol. 2, pp. 759–762 (2004)Google Scholar
  5. 5.
    Sarma, S., Weis, S., Engels, D.: RFID Systems and Security and Privacy Implications. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 454–469. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Ohkubo, M., Suzuki, K., Kinoshita, S.: Efficient Hash-Chain Based RFID Privacy Protection Scheme. In: Ubicomp 2004 (2004)Google Scholar
  7. 7.
    Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: ACM CCS 2003, October 2003, pp. 27–30 (2003)Google Scholar
  8. 8.
    Henrici, D., Müller, P.: Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. In: IEEE PerSec 2004 at IEEE PerCom (March 2004)Google Scholar
  9. 9.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Saito, J., Ryou, J.-C., Sakurai, K.: Enhancing Privacy of Universal Re-Encryption Scheme for RFID Tags. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol. 3207, pp. 879–890. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Avoine, G., Oechslin, P.: A Scalable and Provably Secure Hash-Based RFID Protocol. In: IEEE PerSec 2005, Kauai island, Hawaii, USA, March 8 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Sang-Soo Yeo
    • 1
  • Sung Kwon Kim
    • 1
  1. 1.Chung-Ang UniversitySeoulKorea

Personalised recommendations