Research Article

Untangling RFID Privacy Models

Box 3

Experiment
Setup:
(1) initializes the system .
Phase 1 (Learning):
(2) may do the following in any interleaved order:
 (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively.
 (b) Make arbitrary SETKEY queries to any tags.
 (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries.
Phase 2 (Challenge):
(3) selects two challenge tags and to which it did not send SETKEY queries.
(4) Let and , and remove both from the current tag set.
(5) chooses a bit at random, and provides access to .
(6) may do the following in any interleaved order:
 (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively.
 (b) Make arbitrary SETKEY queries to any tag in the current tag set, except .
 (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries.
(7) outputs a guess bit .
succeeds if .