{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:12Z","timestamp":1750307832501,"version":"3.41.0"},"reference-count":45,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2009,4]]},"abstract":"<jats:p>As the number of RFID applications grows, concerns about their security and privacy become greatly amplified. At the same time, the acutely restricted and cost-sensitive nature of RFID tags rules out simple reuse of traditional security\/privacy solutions and calls for a new generation of extremely lightweight identification and authentication protocols.<\/jats:p>\n          <jats:p>This article describes a universally composable security framework designed especially for RFID applications. We adopt RFID-specific setup, communication, and concurrency assumptions in a model that guarantees strong security, privacy, and availability properties. In particular, the framework supports modular deployment, which is most appropriate for ubiquitous applications. We also describe a set of simple, efficient, secure, and anonymous (untraceable) RFID identification and authentication protocols that instantiate the proposed framework. These protocols involve minimal interaction between tags and readers and place only a small computational load on the tag, and a light computational burden on the back-end server. We show that our protocols are provably secure within the proposed framework.<\/jats:p>","DOI":"10.1145\/1513601.1513603","type":"journal-article","created":{"date-parts":[[2009,5,19]],"date-time":"2009-05-19T16:47:42Z","timestamp":1242751662000},"page":"1-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Universally Composable RFID Identification and Authentication Protocols"],"prefix":"10.1145","volume":"12","author":[{"given":"Mike","family":"Burmester","sequence":"first","affiliation":[{"name":"Florida State University"}]},{"given":"Tri","family":"Van Le","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Breno","family":"De Medeiros","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2009,4]]},"reference":[{"volume-title":"Proceedings of the 4th Annual Conference on Computer and Communications Security(CCS\u201900)","year":"2000","author":"Anderson R.","key":"e_1_2_1_1_1"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102134"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"e_1_2_1_4_1","volume-title":"Proceedings of the Conferences of the Advances in Cryptology (CRYPTO \u201991)","volume":"576","author":"Beaver D.","year":"1991"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196771"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646754.705069"},{"volume-title":"Proceedings of the USENIX Security Symposium (Security\u201905)","author":"Bono S. C.","key":"e_1_2_1_7_1"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368310.1368351"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOMW.2006.359563"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459910006"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/646766.704151"},{"volume-title":"Universally composable symbolic analysis of cryptographic protocols (the case of encryption-based mutual authentication and key exchange). Tech. rep. E-print rep. # 2004\/334","author":"Canetti R.","key":"e_1_2_1_14_1"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715825"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509980"},{"volume-title":"Proceedings of the Conference on the Advances in Cryptology (CRYPTO\u201993)","author":"Coppersmith D.","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","unstructured":"EPC Global. EPC tag data standards vs. 1.3. http:\/\/www.epcglobalinc.org\/standards\/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf.  EPC Global. EPC tag data standards vs. 1.3. http:\/\/www.epcglobalinc.org\/standards\/EPCglobal_Tag_Data_Standard_TDS_Version_1.3.pdf."},{"key":"e_1_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Gilbert H. Rodshaw M. and Sibert H. 2005. An active attack against HB+: A provably secure lightweight authentication protocol. Tech. rep. International Association for Cryptological Research.  Gilbert H. Rodshaw M. and Sibert H. 2005. An active attack against HB+: A provably secure lightweight authentication protocol. Tech. rep. International Association for Cryptological Research.","DOI":"10.1049\/el:20052622"},{"volume-title":"The Foundations of Cryptography","author":"Goldreich O.","key":"e_1_2_1_20_1"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"volume-title":"Grain: A stream cipher for constrained environments. Tech. rep. eSTREAM # 2005\/010, European Network of Excellence for Cryptology.","year":"2005","author":"Hell M.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/WMCSA.1994.29"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39650-5_4"},{"key":"e_1_2_1_26_1","unstructured":"ISO\/IEC. Standard # 18000. RFID air interface standard. http:\/\/www.hightechaid.com\/standards\/18000.htm.  ISO\/IEC. Standard # 18000. RFID air interface standard. http:\/\/www.hightechaid.com\/standards\/18000.htm."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_18"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_6"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURECOMM.2005.32"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102126"},{"volume":"18","volume-title":"Proceedings of the World Academy of Science, Engineering and Technology (WASET\u201906)","author":"Lee H.","key":"e_1_2_1_31_1"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128859"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19"},{"key":"e_1_2_1_34_1","unstructured":"Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. Estream: The stream cipher project. http:\/\/www.ecrypt.eu.org\/stream.  Network of Excellence within the Information Societies Technology (IST) Programme of the European Commission. Estream: The stream cipher project. http:\/\/www.ecrypt.eu.org\/stream."},{"key":"e_1_2_1_35_1","unstructured":"Oren Y. and Shamir A. 2006. Power analysis of RFID tags. http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid\/.  Oren Y. and Shamir A. 2006. Power analysis of RFID tags. http:\/\/www.wisdom.weizmann.ac.il\/~yossio\/rfid\/."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352639"},{"volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201901)","author":"Pfitzmann B.","key":"e_1_2_1_37_1"},{"key":"e_1_2_1_38_1","unstructured":"Redl S. Weber M. and Oliphant M. 1998. GSM and Personal Communications Handbook. Artech House.   Redl S. Weber M. and Oliphant M. 1998. GSM and Personal Communications Handbook . Artech House."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229314"},{"volume":"2523","volume-title":"Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES\u201902)","author":"Sharma S. E.","key":"e_1_2_1_40_1"},{"volume-title":"Proceedings of the USENIX Technical Conference (USENIX\u201988)","author":"Steiner J.","key":"e_1_2_1_41_1"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2007.30"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"volume-title":"Privacy Enhancing Technologies","series-title":"Lecture Notes in Computer Science","author":"Tsudik G.","key":"e_1_2_1_44_1"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229285.1229319"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.95"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1513601.1513603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1513601.1513603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:58Z","timestamp":1750255078000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1513601.1513603"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["10.1145\/1513601.1513603"],"URL":"https:\/\/doi.org\/10.1145\/1513601.1513603","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2009,4]]},"assertion":[{"value":"2007-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}