Research Article
Untangling RFID Privacy Models
Experiment | (1) initializes the system . | (2) requests to receive a tag . | (3) chooses , queries Oracle where , and then receives . Here is known by . | (4) requests to receive two challenges , , and , such that or . | (5) queries Oracle and Oracle , and then receives and . | (6) decides which of or is , and outputs a guess bit . | succeeds if . |
|