Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Скачиваний:
26
Добавлен:
02.04.2015
Размер:
1.95 Mб
Скачать

 

 

the identi er of the tag it authenticated. Although this is an undeniable privacy loss, we could study the impact of learning such an information on other ones that the adversary can try to obtain without relying on the reader.

An extension towards addressing read/write only tags can also be envisaged for that these types of tags are still the most commonly used in real-world applications. Such type of tags only provide two interfaces that can be remotely accessed, one for reading the contents of its memory and another one to set it to a value speci ed in the command. It is rather easy to see that from a classical cryptographic point of view, no privacy can be achieved if the tag performs no computations unless we assume that the adversary does not completely control the communication channels. e goal of the model in here would be to measure the best privacy protection such tags can o er.

11.3Final Notes

e notion of blinder is a powerful tool for assessing the privacy of an RFID system. Yet, we believe that it could be used for other types of cryptographic protocols. At rst, it could be used in key exchange protocols. For the similarities these latter share with RFID protocols, it would be rather straightforward to translate the de nitions from one setting to the other. e paradigm could also be used to deployed key establishment Internet protocols such as SSL/TLS. Similarly,wecanstrengthenzero-knowledgeprotocolswithrequiringthatnotonly the veri er learns anything from a protocol execution but also that no other party can deduce

any information.

Onanotherside,thede nitionsofplaintext-awarenessmaybeimprovedtomaketheknowl- edge extractor able to lter the eventual auxiliary information the ciphertext creator gets.

.