Use this URL to cite or link to this record in EThOS:
Title: Low-cost privacy-preserving cryptography protocols and implementations for RFID
Author: Cao, Xiaolin
Awarding Body: Queen's University Belfast
Current Institution: Queen's University Belfast
Date of Award: 2013
Availability of Full Text:
Full text unavailable from EThOS.
Please contact the current institution’s library for further details.
Protecting RFID security and privacy is very important to the future development of RFID technology. In addition, the low-cost budget of RFID tags imposes a significant challenge to the design and implementation of privacy preserving RFID protocols. Therefore, in this thesis low-cost cryptographic based privacy preserving authentication protocols for RFID devices are examined. Since privacy models are used to formalise adversary capability and to evaluate whether an RFID protocol preserves privacy or not, the first extensive survey of privacy models for RFID authentication protocols is presented. Based on a comprehensive study of the important properties of RFID systems, namely privacy, scalability and low hardware cost, a range of novel RFID security protocols have been proposed. Since the LPN problem can be used as a hardware friendly cryptographic primitive, a low-cost forward private authentication protocol utilising the LPN problem is presented. A practical RFID protocol needs to be scalable, and the scalability performance is determined by both the RFID tags and reader. Therefore, novel techniques for balancing the performance between scalability and forward privacy are proposed, which can be used to reduce the hardware cost on the tag and the storage cost on the server, and also to accelerate the tag look-up procedure on the server. In addition, since asymmetric-key cryptography can be used to offer perfect constant-time scalability and ID based cryptography can be used to reduce the key management cost on the server, novel privacy-preserving protocols and a low-cost hardware architecture , based on an existing ID-based asymmetric-key NIKD scheme, are proposed for RFID-based health care applications.
Supervisor: Not available Sponsor: Not available
Qualification Name: Thesis (Ph.D.) Qualification Level: Doctoral
EThOS ID:  DOI: Not available