Research Article
Untangling RFID Privacy Models
Experiment . | (1) initializes the system . | (2) requests to receive a tag . | (3) chooses , queries Oracle where , and then receives . | (4) requests to receive two challenge tags and , such that or . | (5) chooses and such that , , and . | (6) queries Oracle and Oracle , and then receives and . | (7) decides which of or is , and outputs a guess bit . | succeeds if . |
|