International Association for Cryptologic Research (IACR)
Abstract
The counterfeiting of pharmaceutics or luxury objects is a major
threat to supply chains today. As different facilities of a
supply chain are distributed and difficult to monitor, malicious
adversaries can inject fake objects into the supply chain. This
paper presents Tracker, a protocol for object genuineness verification
in RFID-based supply chains. More precisely, Tracker allows to securely
identify which (legitimate) path an object/tag has taken through a
supply chain. Tracker provides privacy: an adversary can neither learn
details about an object\u27s path, nor can it trace and link objects in
supply chain. Tracker\u27s security and privacy is based on an extension of
polynomial signature techniques for run-time fault detection using
homomorphic encryption. Contrary to related work, RFID tags in this
paper are not required to perform \emph{any computation}, but only
feature a few bytes of storage such as ordinary EPC Class 1 Gen 2
tags