• Aucun résultat trouvé

Privacy Analysis

Dans le document Security and privacy in RFID systems (Page 107-111)

updated its state successfully or not. If not, ownerOk+1engages in mutual authentications with tagT until the latter updates its internal state.

Remark 4.5. To prevent the old owner Ok of tag T from tracing T later in the future, the new owner Ok+1 has to run a mutual authentication with T outside the range of Ok right after the ownership transfer. In this manner, tag T and ownerOk+1 will share a symmetric key that Ok cannot retrieve without a physical access to the tag.

4.5 Privacy Analysis

In this section, we prove thatROTIV is privacy preserving under the XDH assumption.

4.5.1 Forward Unlinkability

Theorem 4.1. ROTIV ensures forward unlinkability under the XDH assumption.

Proof. Assume that there is an adversaryA(r, s, t, ǫ) who succeeds in the forward unlinkability game with a non negligible advantageǫ. We will now construct an adversary B, who usesA as a subroutine and breaks the DDH assumption inG1 with a non-negligible advantageǫ.

LetODDH be an oracle that when queried, selects first two random elementsx, y∈Fqand flips a fair coinb∈ {0,1}. Ifb= 1, thenODDH sets z=xy; otherwise zis randomly selected from Fq. Finally, it returns the tuple (g, gx, gy, gz)∈G1.

To break the DDH assumption inG1, adversaryBfirst queries the oracleODDH to receive (g, gx, gy, gz) and simulates a complete ROTIV system forA.

• Adversary B selects randomly a random number skI ∈ Fq and computes pkI = hskI. (skI,pkI) represents the secret and the public keys of issuer I.

• Adversary B picks η random numbers xk ∈ Fq, and assigns to each owner Ok in the supply chain a public key pkk= (g,˜gk =gxxk).

Although, owner Ok does not know the secret key skk = xxk that corresponds to the public key pkk, owner Ok can always authenticate tag T by running a MAC-based authentication. Also, owner Ok can always transfer the ownership of tags he owns, since the ownership references do not depends on the secret keyskk.

• To issue a tag T, B first selects ID and KT0 ∈Fq, then computes S = H(ID)skI, c0T = (u0T, v0T) = (1,S). Finally, he storesST0 = (KT0, c0T) in tagT.

Learning phase. Adversary Bsimulates challenger C.

• B simulatesOTag and gives Atwo challenge tags T0 and T1.

4. RFID-BASED OWNERSHIP TRANSFER WITH ISSUER VERIFICATION

• A calls the oracle OExecute for tags T0 and T1. Without loss of generality, we assume thatT0 and T1 are owned by ownerOk and Ol respectively.

After a successful authentication, the ciphertexts cjT

0 and cjT

1 stored into tags T0 and T1 respectively are updated using the pair (gy, gz) as follows:

cj+1T0 = (uj+1T0 , vTj+10 ) = (gyrj+10 , H(ID0)skIgzxkrj+10 ) who can run mutual authentications with tagsTi.

Challenge phase.

• In the challenge phase,Bpicks randomlyb∈ {0,1}and returns tag Tb from the pair of tagsT0 andT1. Then, he starts a mutual authentication with tag Tb outside the range of adversaryA by sending a nonceNTj

b.

Without loss of generality, we assume that tagTb is owned by ownerOk (i.e.,b= 0).

• At the end of the authentication,B updates the state of tagTb as follows:

STj+1

b is the nonce generated by tagTb during the mutual authentication.

• B simulatesOFlip and returns tag Tb to adversary A. The ownership of tagTb is then transferred to A.

Notice that Bcan compute correct ownership references for tag Tb: refTb = (Sb,idb, Kbold, Kbnew,randoldb ,randnewb ) giveAany information aboutTb’s past interactions. Consequently, adversaryAhas to rely on ciphertext cjT+1

b to build his attack againstROTIV’s forward unlinkability.

• At the end of the challenge phase,Aoutputs his guess b of bitb.

84

4.5 Privacy Analysis Ifz=xy, then the simulation of ROTIV by adversaryB in the learning phase does not differ from an actual ROTIVsystem. As a result, adversaryAcan output a correct guessb for bit bwith a non-negligible advantage ǫ.

Ifz6=xy, then the view of adversaryAduring the learning phase of the forward unlink-ability game is independent of b. Therefore, adversary A has only a negligible advantage in outputting a correct guess b for the bitb.

This constructs a statistical distinguisher between the two distributions (g, gx, gy, gxy) and (g, gx, gy, gz), x, y, z ∈Fq, which breaks the DDH assumption inG1. In fact, if adversaryA outputs a correct guessb for the bitb, then adversaryBoutputsz=xy; otherwise adversary B outputsz6=xy.

Hence, if adversaryAhas a non-negligible advantageǫin breaking the forward unlinkabil-ity of ROTIV, then adversaryBwill also have a non-negligible advantage ǫ =ǫin breaking the DDH assumption in G1. This leads to a contradiction under the XDH assumption.

4.5.2 Backward Unlinkability

Theorem 4.2. ROTIV ensures backward unlinkability under the XDH assumption.

Proof. Assume that there is an adversary A(r, s, t, ǫ) who succeeds in the backward unlink-ability game with a non-negligible advantage ǫ. We will now construct an adversaryB, who usesAas a subroutine and breaks the DDH assumption inG1with a non-negligible advantage ǫ.

To break the DDH assumption inG1, adversaryBfirst queries the oracleODDH to receive (g, gx, gy, gz) and simulates a complete ROTIV system forA. .

• Adversary B selects randomly a random number skI ∈ Fq and computes pkI = hskI. (skI,pkI) represents the secret and the public keys of issuer I.

• Adversary B picks η random numbers xk ∈ Fq, and assigns to each owner Ok in the supply chain a public key pkk= (g,˜gk =gxxk).

• To issue a tag T, B first selects ID and KT0 ∈Fq, then computes S = H(ID)skI, c0T = (u0T, v0T) = (1,S). Finally, he storesST0 = (KT0, c0T) in tagT.

Learning phase. Adversary Bsimulates challenger Cas follows.

• B simulatesOTag and gives Atwo challenge tags T0 and T1.

• The ownership of tags T0 and T1 is transferred to adversaryA. A now has full control over tags T0 andT1.

• B providesA withstags Ti whose ownership is transferred toA.

4. RFID-BASED OWNERSHIP TRANSFER WITH ISSUER VERIFICATION

Challenge phase.

• AdversaryAreleases the ownership of the challenge tagsT0andT1by calling the oracle OTransfer.

• Bsimulates challengerCby first picking randomlyb∈ {0,1}and returning tagTb from the pair of tagsT0andT1. Then, he starts a mutual authentication with tagTb outside the range of adversary A by sending a nonceNTj

b.

Without loss of generality, we assume that tagTb is owned by ownerOk.

• At the end of the authentication, B updates the state of tagTb using the pair (gy, gz)

• B simulatesOFlip and returns tag Tb to adversary A. Given thatAdoes not have access toNTj

b) does not give Aany information about tag Tb, and adversary Ahas to build his attack against the backward unlinkability ofROTIV upon the ciphertextcjT+1

b .

• At the end of the challenge phase,Aoutputs his guess b of bitb.

Note that if z = xy, then the ciphertext cjT+1

b is a correct encryption of H(IDb)skI, i.e., STj+1

b is a valid state that corresponds to tag Tb. Hence, the simulation of ROTIV by adversary B does not differ from an actual ROTIV system, and adversary A can output a correct guessb for bit bwith a non-negligible advantage ǫ.

If z6=xy, then the state STj+1

b does not correspond to tag Tb, and the view of adversary A during the backward unlinkability game is independent of b. Consequently, adversary A has only a negligible advantage in outputting a correct guessb for the bit b.

This leads to a statistical distinguisher between the two distributions (g, gx, gy, gxy) and (g, gx, gy, gz), x, y, z∈Fq, breaking hereby the DDH assumption in G1. In fact, if adversary A outputsb=b, then adversaryB outputsz=xy; otherwise adversaryB outputsz6=xy.

Therefore, if Ahas a non-negligible advantage ǫin breaking the backward unlinkability of ROTIV, then adversary B will have a non-negligible advantageǫ=ǫ in breaking the DDH assumption inG1. This contradicts the XDH assumption.

86

Dans le document Security and privacy in RFID systems (Page 107-111)