
identification and/or authentication procedure and
sends back to the tag its answer m
3
.
The first two steps are usually used in the case of uni-
lateral authentication. The third step is used to allow
the tag to authenticate the reader.
Theorem 4.2. Any weak-winsider private SKC-based
RFID scheme is also weak-insider private in the
HPVP model.
Proof. Assume that Σ is an weak-winsider private
SKC-based RFID scheme that is not weak-insider pri-
vate in the HPVP model. Let A be a weak-insider
adversary against Σ. We define a weak-winsider ad-
versary A
′
that has the same advantage against Σ as
A, leading thus to a contradiction (because Σ is weak
private).
The main idea is the next one. The adversary A
′
runs and monitors A to play with Σ:
• If A does not use any insider tag, then A
′
does not
do anything;
• If A queries CreateInsider, A
′
will create an win-
sider tag for A and gives him the internal state.
Moreover, A
′
will keep track of this tag (state up-
dates and involvements in the protocol sessions);
• Insider tags cannot be drawn and so they can-
not be queried by means of SendTag. However,
their internal states can be used by A to query
SendReader(m,π), where m is a valid message
built from an insider tag information and accord-
ing to the messages of the protocol session π. The
adversary A
′
can check is m fulfills this property
because Σ uses only SKC and the winsider tags
were created by A
′
. Therefore, in such a case, A
′
will simulate the reader’s answer for A and also
know how to answer queries addressed to the ora-
cle Result.
In this way, A
′
will play with Σ as A does, but without
using any insider tag. In other words, A
′
is a weak-
winsider adversary. Moreover, its advantage against
Σ is exactly the advantage of A against Σ. Hence,
the assumption that A has a non-negligible advantage
against Σ contradicts the weak-winsider privacy of Σ.
Remark 4.1. If the adversary can create himself win-
sider tags in an RFID scheme, then the scheme is
weak private if and only if it is weak-winsider pri-
vate. The PRF-based scheme in the previous section
fits this case because the function F is public, and so
is its keyspace; the adversary can create insider tags
himself.
Corollary 4.1. The PRF-based RFID scheme in Sec-
tion 4.1 is weak-insider private.
Proof. From Theorem 4.2 and Remark 4.1.
4.3 Randomized Weak Privacy
Randomized weak (r-weak) privacy was introduced in
(Hristea and T¸ iplea, 2020) as a weaker form of weak
privacy in Vaudenay’s model. It helps identify enti-
ties where tracing is unimportant or cannot be done
appropriately due to very high mobility or crowding
in which the entity is. For details, please see (Hristea
and T¸ iplea, 2020).
In the HPVP model, r-weak privacy can simply be
obtained by replacing the oracle Free(vtag) with the
oracle r-Free(vtag) defined as follows:
r-Free(vtag): the freed tag is re-randomized.
By tag re-randomization, we mean that after the
tag is freed, some of the parameters that were set ran-
domly are replaced by others, also chosen randomly,
so that the tag’s response to a new communication
with the adversary is indistinguishable from the re-
sponses from previous communications. For exam-
ple, if the tag computes F
K
(x), where F is a PRF and
x is a random secret parameter, re-randomization can
be achieved by randomly choosing a new parameter x
or a new key K.
The RFID scheme in Figure 8, proposed in (Hris-
tea and T¸ iplea, 2020), is r-weak private in the Vau-
denay model. We will show that it is r-weak pri-
vate in the HPVP model as well. First, let us dis-
cuss the scheme a little. The tag, which takes the
first step in the protocol, computes z = F
K
(0,0,x),
where F = (F
K
)
K
is a pseudo-random function, and
sends it to the reader. The reader checks its database
for a triple (ID, K,x) such that z = F
K
(0,0,x) or z =
F
K
(0,0,x + 1). The reason is that at most one step
of desynchronization may occur between reader and
tag. When the reader finds the right value, resynchro-
nizes with the tag and prepares the answer w. The
tag checks the value w received from reader, takes a
decision, updates x if necessary, and prepares the an-
swer for reader. On receiving the tag’s answer, the
reader checks it, takes a decision, and updates x. If
the reader does not update x (because it rejects the
tag), then it will do so in the second step of the next
protocol session (with the same tag). Therefore, the
desynchronization between reader and tag is at most
one step.
It is straightforward to check the correctness of the
scheme in Figure 8. We remark that it does not use
temporary variables, and the tag only needs to com-
pute F. Moreover,the scheme allows for a quite effi-
cient search procedure in the reader’s database. Two
ordered sets of indices are used: the first one with in-
dices of the form F
K
(0,0,x), and the second one with
Weak, Weak-Insider, and Randomized Weak Privacy in the HPVP Model for RFID
165