{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:04Z","timestamp":1758845644867},"reference-count":25,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2012]]},"DOI":"10.1587\/transinf.e95.d.2","type":"journal-article","created":{"date-parts":[[2012,1,4]],"date-time":"2012-01-04T11:34:32Z","timestamp":1325676872000},"page":"2-11","source":"Crossref","is-referenced-by-count":4,"title":["A Survey on Privacy Frameworks for RFID Authentication"],"prefix":"10.1587","volume":"E95-D","author":[{"given":"Chunhua","family":"SU","sequence":"first","affiliation":[{"name":"Institute for Infocomm Research"}]},{"given":"Yingjiu","family":"LI","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University"}]},{"given":"Yunlei","family":"ZHAO","sequence":"additional","affiliation":[{"name":"Software School, Fudan University"}]},{"given":"Robert H.","family":"DENG","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University"}]},{"given":"Yiming","family":"ZHAO","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Fudan University"}]},{"given":"Jianying","family":"ZHOU","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] G. Avoine, &ldquo;Adversary Model for Radio Frequency Identification,&rdquo; Technical Report LASEC-REPORT-2005-001,&rdquo; Swiss Federal Institute of Technology (EPFL), Security and Cryptography Laboratory (LASEC), 2005."},{"key":"2","unstructured":"[2] G. Avoine, &ldquo;RFID Security &amp; Privacy Lounge,&rdquo; http:\/\/www.avoine.net\/rfid\/"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Blum, P. Feldman, and S. Micali, &ldquo;Non-Interactive Zero-Knowledge and Its Applications,&rdquo; (Extended Abstract), Proc. 20th STOC, pp.103-112, 1988.","DOI":"10.1145\/62212.62222"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] M. Burmester, T. Le, and B. Medeiros, &ldquo;Provably secure ubiquitous systems: Universally composable RFID authentication protocols,&rdquo; Proc. 2nd IEEE CreateNet International Conference on Security and Privacy in Communication Networks, 2006.","DOI":"10.1109\/SECCOMW.2006.359563"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] M. Burmester, T.V. Le, B. Medeiros, and G. Tsudik, &ldquo;Universally composable RFID identification and authentication protocols,&rdquo; ACM Trans. Information and System Security, vol.12, no.4, pp.1-33, 2009.","DOI":"10.1145\/1513601.1513603"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] R. Canetti, &ldquo;Universally Composable Security: A new paradigm for cryptographic protocols,&rdquo; Proc. 42nd FOCS, pp.136-145, 2001.","DOI":"10.1109\/SFCS.2001.959888"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] R. Canetti, Y. Dodis, R. Pass, and S. Walfish, &ldquo;Universal composable security with global setup,&rdquo; Theory of Cryptography (TCC) 2007, LNCS 4392, pp.61-85, Springer-Verlag, 2007.","DOI":"10.1007\/978-3-540-70936-7_4"},{"key":"8","unstructured":"[8] S. Canard, I. Coisel, J. Etrog, and M. Girault, &ldquo;Privacy-Preserving RFID Systems: Models and Constructions,&rdquo; Cryptology ePrint Archive, Report no.2010\/405, 2010."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] R.H. Deng, Y. Li, M. Yung, and Y. Zhao, &ldquo;A new framework for RFID privacy,&rdquo; Proc. 15th European conference on Research in computer security (ESORICS10), pp.1-18, 2010.","DOI":"10.1007\/978-3-642-15497-3_1"},{"key":"10","unstructured":"[10] J. Ha, S. Moon, J. Zhou, and J. Ha, &ldquo;A new formal proof model for RFID location privacy,&rdquo; Proc. European Symposium on Research in Computer Security (ESORICS) 2008, vol.5283 of LNCS, pp.267-281, 2008."},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861395"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] A. Juels and S. Weis, &ldquo;Defining strong privacy for RFID,&rdquo; Proc. International Conference on Pervasive Computing and Communications (PerCom 2007), 2007.","DOI":"10.1109\/PERCOMW.2007.37"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] T. Van Le, M. Burmester, and B. Medeiros, &ldquo;Universally composable and forward secure RFID authentication and authenticated key exchange,&rdquo; Proc. ACM Symposium on Information, Computer and Communications Security (ASIACCS 2007), pp.242-252, Singapore, 2007.","DOI":"10.1145\/1229285.1229319"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] J. Lai, R.H. Deng, and Y. Li, &ldquo;Revisiting unpredictability-Based RFID privacy models,&rdquo; Proc. ACNS 2010, pp.475-492, 2010.","DOI":"10.1007\/978-3-642-13708-2_28"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] C. Ma, Y. Li, R. Deng, and T. Li, &ldquo;RFID privacy: Relation between two notions, minimal condition, and efficient construction,&rdquo; Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009), pp.54-65, Chicago, US, Nov. 2009.","DOI":"10.1145\/1653662.1653670"},{"key":"16","unstructured":"[16] C. Ma, &ldquo;An Improved Privacy-Preserving RFID Protocol,&rdquo; (in Chinese), Chinese Journal of Computer, no.8, pp.1387-1398, 2011."},{"key":"17","unstructured":"[17] C. Ng, W. Susilo, Y. Mu, and R. Safavi-Naini, &ldquo;Practical RFID ownership transfer scheme,&rdquo; Proc. Workshop on RFID Security (RFIDSec Asia'10). Volume 4 of Cryptology and Information Security, Singapore, Feb. 2010."},{"key":"18","unstructured":"[18] M. Ohkubo, K. Suzuki, and S. Kinoshita, &ldquo;Efficient hash-chain based RFID privacy protection scheme,&rdquo; International Conference on Ubiquitous Computing-Ubicomp, Workshop Privacy: Current Status and Future Directions, 2004."},{"key":"19","unstructured":"[19] R. Paise and S. Vaudenay, &ldquo;Mutual authentication in RFID: Security and privacy,&rdquo; Proc. 2008 ACM symposium on Information, computer and communications security (ASIACSS2008). pp.292-299, Japan, 2008."},{"key":"20","unstructured":"[20] C. Su, Y. Li, T. Li, and R.H. Deng, &ldquo;RFID mutual authentication protocal with universally composable security,&rdquo; Proc. 2011 Workshop on RFID Security (RFIDsec'11 Asia), pp.35-49, Wuxi, China, April 2011."},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] G. Tsudik, &ldquo;A Family of dunces: Trivial RFID identification and authentication protocols,&rdquo; Proc. Privacy Enhancing Technologies 2007 (PET 2007), volume 4776 of Lecture Notes in Computer Science, pp.45-61, Canada, 2007.","DOI":"10.1007\/978-3-540-75551-7_4"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] P. Tuyls and L. Batina, &ldquo;RFID-tags for anti-counterfeiting,&rdquo; Proc. Topics in Cryptology-CT-RSA 2006. Springer Verlag, Lecture Notes in Computer Science, 2006.","DOI":"10.1007\/11605805_8"},{"key":"23","unstructured":"[23] S. Vaudenay, &ldquo;On privacy models for RFID,&rdquo; Proc. Asiacrypt 2007, vol.4833 of Lecture Notes in Computer Science, pp.68-87, Kuching, Malaysia, Dec. 2007."},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129508007330"},{"key":"25","unstructured":"[25] A.C. Yao, F.F. Yao, and Y. Zhao, &ldquo;A note on universal composable zero-knowledge in the common reference string model,&rdquo; Theor. Comput. Sci., vol.410, no.11, pp.1099-1108, 2009."}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/1\/E95.D_1_2\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:37:31Z","timestamp":1619419051000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E95.D\/1\/E95.D_1_2\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.e95.d.2","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}