LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Privacy Model for Threshold RFID System Based on PUF

Photo by averey from unsplash

In order to enhance shared control of the secret among multiple RFID tags and to ensure secure communication through an insecure channel, we present in this paper a new idea… Click to show full abstract

In order to enhance shared control of the secret among multiple RFID tags and to ensure secure communication through an insecure channel, we present in this paper a new idea of threshold RFID system. We extend well-known Vaudenay’s RFID privacy model (Vaudenay in Adv Cryptolo 68–87, 2007) to make the RFID system acceptable for threshold secret sharing system among n tags. To show its implementation and to resist tag compromising attack, we design an efficient threshold RFID authentication protocol based on physical unclonable functions. It is a method of distributing a secret s among a set of n RFID tags in such a way that any set of $$t (t

Keywords: rfid system; threshold rfid; system; privacy model; rfid

Journal Title: Wireless Personal Communications
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.