Research Article
Untangling RFID Privacy Models
Experiment | Setup: | (1) initializes the system . | Phase 1 (Learning): | (2) may do the following in any interleaved order: | (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively. | (b) Make arbitrary SETKEY queries to any tags. | (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries. | Phase 2 (Challenge): | (3) selects two challenge tags and to which it did not send SETKEY queries. | (4) Let and , and remove both from the current tag set. | (5) chooses a bit at random, and provides access to . | (6) may do the following in any interleaved order: | (a) Make LAUNCH and TAGINIT queries, without exceeding and overall queries respectively. | (b) Make arbitrary SETKEY queries to any tag in the current tag set, except . | (c) Make SENDREADER and SENDTAG queries, without exceeding overall queries. | (7) outputs a guess bit . | succeeds if . |
|