{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:28:44Z","timestamp":1775014124503,"version":"3.50.1"},"reference-count":24,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2009,10]]},"abstract":"<jats:p>In this work, we consider privacy in Radio Frequency IDentification (RFID) systems. Our contribution is twofold: (i) We propose a simple, formal definition of strong privacy useful for basic analysis of RFID systems, as well as a different (weaker) definition applicable to multiverifier systems; (ii) We apply our definition to reveal vulnerabilities in several proposed privacy-enhancing RFID protocols; and (iii) We formally analyze and suggest improvements to hash-locks, one of the first privacy-enhancing RFID protocols in the literature.<\/jats:p>","DOI":"10.1145\/1609956.1609963","type":"journal-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:28:31Z","timestamp":1257359311000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":106,"title":["Defining strong privacy for RFID"],"prefix":"10.1145","volume":"13","author":[{"given":"Ari","family":"Juels","sequence":"first","affiliation":[{"name":"RSA Security, Cambridge, MA"}]},{"given":"Stephen A.","family":"Weis","sequence":"additional","affiliation":[{"name":"Google, San Francisco, CA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Alien Technology Corporation achieves another step toward pervasive, economic RFID with announcement of 12.9 cent RFID labels","author":"Alien Technology","unstructured":"Alien Technology . 2005. Alien Technology Corporation achieves another step toward pervasive, economic RFID with announcement of 12.9 cent RFID labels . Alien Technology Press release. http:\/\/www.alientechnology.com. Alien Technology. 2005. Alien Technology Corporation achieves another step toward pervasive, economic RFID with announcement of 12.9 cent RFID labels. Alien Technology Press release. http:\/\/www.alientechnology.com."},{"key":"e_1_2_1_3_1","unstructured":"Avoine G. 2006. Security and privacy in RFID systems. http:\/\/lasecwww.ep.ch\/figavoine\/rfid\/.  Avoine G. 2006. Security and privacy in RFID systems. http:\/\/lasecwww.ep.ch\/figavoine\/rfid\/."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_20"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11507840_14"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2005.12"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Burmester M. van Le T. and de Medeiros B. 2006. Provably secure ubiquitous systems: Universally composable RFID authentication protocols. http:\/\/eprint.iacr.org\/2006\/131.pdf.  Burmester M. van Le T. and de Medeiros B. 2006. Provably secure ubiquitous systems: Universally composable RFID authentication protocols. http:\/\/eprint.iacr.org\/2006\/131.pdf.","DOI":"10.1109\/SECCOMW.2006.359563"},{"key":"e_1_2_1_9_1","volume-title":"Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust. IEEE","author":"Engberg S.","unstructured":"Engberg , S. , Harning , M. , and Jensen , C . 2004. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience . In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust. IEEE , Los Alamitos, CA. Engberg, S., Harning, M., and Jensen, C. 2004. Zero-knowledge device authentication: Privacy and security enhanced RFID preserving business value and consumer convenience. In Proceedings of the 2nd Annual Conference on Privacy, Security, and Trust. IEEE, Los Alamitos, CA."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30496-8_5"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the Cryptographers' Track RSA Conference (CT-RSA). Springer","author":"Golle P.","unstructured":"Golle , P. , Jakobsson , M. , Juels , A. , and Syverson , P . 2004. Universal re-encryption for mixnets . In Proceedings of the Cryptographers' Track RSA Conference (CT-RSA). Springer , Berlin, 163--178. Golle, P., Jakobsson, M., Juels, A., and Syverson, P. 2004. Universal re-encryption for mixnets. In Proceedings of the Cryptographers' Track RSA Conference (CT-RSA). Springer, Berlin, 163--178."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1980.1056220"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30598-9_11"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948126"},{"key":"e_1_2_1_16_1","volume-title":"Can zero-knowledge tags protect privacy&amp;quest","author":"Kahn F.","year":"1891","unstructured":"Kahn , F. 2005. Can zero-knowledge tags protect privacy&amp;quest ; RFID J. http:\/\/www.rfidjournal.com\/article\/articleview\/ 1891 \/1\/1\/. Kahn, F. 2005. Can zero-knowledge tags protect privacy&amp;quest; RFID J. http:\/\/www.rfidjournal.com\/article\/articleview\/1891\/1\/1\/."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of the International Workshop on Exploiting Context Histories in Smart Environments. Springer-Verlag","author":"Kinoshita A.","unstructured":"Kinoshita , A. , Ohkubo , M. , Hoshino , F. , Morohashi , G. , Shionoiri , O. , and Kanai , A . 2005. Privacy enhanced active RFID tag . In Proceedings of the International Workshop on Exploiting Context Histories in Smart Environments. Springer-Verlag , Berlin. Kinoshita, A., Ohkubo, M., Hoshino, F., Morohashi, G., Shionoiri, O., and Kanai, A. 2005. Privacy enhanced active RFID tag. In Proceedings of the International Workshop on Exploiting Context Histories in Smart Environments. Springer-Verlag, Berlin."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_19"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030112"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102212"},{"key":"e_1_2_1_21_1","unstructured":"O'Connor M. 2006. EPC tags subject to phone attacks. RFID J. http:\/\/www1.rfidjournal.com\/article\/articleview\/2167\/1\/1.  O'Connor M. 2006. EPC tags subject to phone attacks. RFID J. http:\/\/www1.rfidjournal.com\/article\/articleview\/2167\/1\/1."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_36"},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the International Conference on Ubiquitous Computing. Springer-Verlag","author":"Ohkubo M.","unstructured":"Ohkubo , M. , Suzuki , K. , and Kinoshita , S . 2004. Efficient hash-chain-based RFID privacy protection scheme . In Proceedings of the International Conference on Ubiquitous Computing. Springer-Verlag , Berlin. Ohkubo, M., Suzuki, K., and Kinoshita, S. 2004. Efficient hash-chain-based RFID privacy protection scheme. In Proceedings of the International Conference on Ubiquitous Computing. Springer-Verlag, Berlin."},{"key":"e_1_2_1_24_1","unstructured":"Tsudik G. 2006a. Personal communication.  Tsudik G. 2006a. Personal communication."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2006.152"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the International Conference on Security in Pervasive Computing (SPC'03)","author":"Weis S.","unstructured":"Weis , S. , Sarma , S. , Rivest , R. , and Engels , D . 2003. Security and privacy aspects of low-cost radio frequency identification systems . In Proceedings of the International Conference on Security in Pervasive Computing (SPC'03) . Springer-Verlag, Berlin, 454--469. Weis, S., Sarma, S., Rivest, R., and Engels, D. 2003. Security and privacy aspects of low-cost radio frequency identification systems. In Proceedings of the International Conference on Security in Pervasive Computing (SPC'03). Springer-Verlag, Berlin, 454--469."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1609956.1609963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:14Z","timestamp":1750278374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1609956.1609963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["10.1145\/1609956.1609963"],"URL":"https:\/\/doi.org\/10.1145\/1609956.1609963","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"value":"1094-9224","type":"print"},{"value":"1557-7406","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10]]},"assertion":[{"value":"2007-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}