Journal of Computer Networks and Communications / 2013 / Article / Figbox 5

Research Article

Untangling RFID Privacy Models

Box 5

Ideal Functionality
(i) Upon receiving INITIATE  from   : if is corrupted then ignore this message. Else generate a unique
execution identification , record init and send init to the adversary.
(ii) Upon receiving ACCEPT   from the adversary: if there are two records init
and init where and are feasible partners, then remove them, record
partner and write output ACCEPT to . Else if there is a record
partner , then remove it and write output ACCEPT to .
(iii) Upon receiving IMPERSONATE   from the adversary: if there is a record init
and party is corrupted, then remove this record and write output ACCEPT to .
(iv) Upon receiving CORRUPT   from the adversary: if there is a record init or
partner such that is corruptible, then mark as corrupted and remove state .

We are committed to sharing findings related to COVID-19 as quickly as possible. We will be providing unlimited waivers of publication charges for accepted research articles as well as case reports and case series related to COVID-19. Review articles are excluded from this waiver policy. Sign up here as a reviewer to help fast-track new submissions.