Research Article

Untangling RFID Privacy Models

Box 2

Experiment
(1) initializes the system .
(2) requests to receive a tag .
(3) chooses , queries Oracle where , and then receives . Here is known by .
(4) requests to receive two challenges , , and , such that or .
(5) queries Oracle and Oracle , and then receives and .
(6) decides which of or is , and outputs a guess bit .
succeeds if .