Ecole d'ingénieur et centre de recherche en Sciences du numérique

Tracker : security and privacy for RFID-based supply chains

Blass, Erik-Oliver; Elkhiyaoui, Kaoutar; Molva, Refik

Cryptology ePrint archive, report 2010/219, April 2010

    RACKER, a protocol for object genuineness verification in RFIDbasedRACKER allows to securelyRACKER provides privacy: an adversary can neitherRACKER’s security and privacy is based on anany computation, supply chains. More precisely, T identify which (legitimate) path an object/tag has taken through a supply chain. T learn details about an object’s path, nor can it trace and link objects in supply chain. T extension of polynomial signature techniques for run-time fault detection using homomorphic encryption. Contrary to related work, RFID tags in this paper are not required to perform but only feature a few bytes of storage such as ordinary EPC Class 1 Gen 2 tags.   The counterfeiting of pharmaceutics or luxury objects is a major threat to supply chains today. As different facilities of a supply chain are distributed and difficult to monitor, malicious adversaries can inject fake objects into the supply chain. This paper presents T

Document Bibtex

Titre:Tracker : security and privacy for RFID-based supply chains
Mots Clés:cryptographic protocols / RFID, privacy, supply chain management, counterfeiting
Département:Sécurité numérique
Eurecom ref:3087
Copyright: IACR
Bibtex: @techreport{EURECOM+3087, year = {2010}, title = {{T}racker : security and privacy for {RFID}-based supply chains}, author = {{B}lass, {E}rik-{O}liver and {E}lkhiyaoui, {K}aoutar and {M}olva, {R}efik}, number = {EURECOM+3087}, month = {04}, institution = {Eurecom}, url = {},, }
Voir aussi: