RACKER, a protocol for object genuineness verification in RFIDbasedRACKER allows to securelyRACKER provides privacy: an adversary can neitherRACKER’s security and privacy is based on anany computation,
supply chains. More precisely, T
identify which (legitimate) path an object/tag has taken through a
supply chain. T
learn details about an object’s path, nor can it trace and link objects
in supply chain. T
extension of polynomial signature techniques for run-time fault detection
using homomorphic encryption. Contrary to related work,
RFID tags in this paper are not required to perform
but only feature a few bytes of storage such as ordinary EPC
Class 1 Gen 2 tags.
The counterfeiting of pharmaceutics or luxury objects is a major
threat to supply chains today. As different facilities of a supply
chain are distributed and difficult to monitor, malicious adversaries
can inject fake objects into the supply chain. This paper presents
T