Tracker : security and privacy for RFID-based supply chains

Blass, Erik-Oliver; Elkhiyaoui, Kaoutar; Molva, Refik
Cryptology ePrint archive, report 2010/219, April 2010

 

 

RACKER, a protocol for object genuineness verification in RFIDbasedRACKER allows to securelyRACKER provides privacy: an adversary can neitherRACKER’s security and privacy is based on anany computation,

supply chains. More precisely, T

identify which (legitimate) path an object/tag has taken through a

supply chain. T

learn details about an object’s path, nor can it trace and link objects

in supply chain. T

extension of polynomial signature techniques for run-time fault detection

using homomorphic encryption. Contrary to related work,

RFID tags in this paper are not required to perform

but only feature a few bytes of storage such as ordinary EPC

Class 1 Gen 2 tags.

 

The counterfeiting of pharmaceutics or luxury objects is a major

threat to supply chains today. As different facilities of a supply

chain are distributed and difficult to monitor, malicious adversaries

can inject fake objects into the supply chain. This paper presents

T


Type:
Report
Date:
2010-04-19
Department:
Digital Security
Eurecom Ref:
3087
Copyright:
IACR

PERMALINK : https://www.eurecom.fr/publication/3087