{"title":"基于刷新的标签识别方案研究","authors":"Jihoon Cho","doi":"10.1109/CCNC.2009.4784992","DOIUrl":null,"url":null,"abstract":"We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.","PeriodicalId":181188,"journal":{"name":"2009 6th IEEE Consumer Communications and Networking Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"On Refresh-Based Tag Identification Schemes\",\"authors\":\"Jihoon Cho\",\"doi\":\"10.1109/CCNC.2009.4784992\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.\",\"PeriodicalId\":181188,\"journal\":{\"name\":\"2009 6th IEEE Consumer Communications and Networking Conference\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-01-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 6th IEEE Consumer Communications and Networking Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCNC.2009.4784992\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 6th IEEE Consumer Communications and Networking Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCNC.2009.4784992","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We give a definition for a tag identification scheme which uses refresh techniques. We also define a notion of privacy for such a scheme, which accurately reflects real-world threats and tag capabilities. Universal re-encryption, as a refresh technique, has been proposed as an approach to enhance privacy in a pervasive computing environment. However, it permits a hidden adversarial communication channel in a tag identification scheme. Insubvertible encryption was subsequently introduced to address this limitation. We show how the security properties of these two encryption techniques can be used to help enhance privacy in a refresh-based tag identification scheme, and discuss their limitations. We also suggest the practical use of refresh approaches in RFID applications.