Journal of Computer Networks and Communications / 2013 / Article / Figbox 3

Research Article

Untangling RFID Privacy Models

Box 3

Experiment
Setup:
(1) initializes the system .
Phase 1 (Learning):
(2) may do the following in any interleaved order:
 (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively.
 (b) Make arbitrary SETKEY queries to any tags.
 (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries.
Phase 2 (Challenge):
(3) selects two challenge tags and to which it did not send SETKEY queries.
(4) Let and , and remove both from the current tag set.
(5) chooses a bit at random, and provides access to .
(6) may do the following in any interleaved order:
 (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively.
 (b) Make arbitrary SETKEY queries to any tag in the current tag set, except .
 (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries.
(7) outputs a guess bit .
succeeds if .

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.