Skip to main content
. 2019 Jul 24;19(15):3259. doi: 10.3390/s19153259

Table 2.

Bluetooth privacy game for the LESSP-type protocols.

Untraceability on Bluetooth Device
Bluetooth Privacy Game π’«π’’π’œ,Ξ [n, k]
 Phase 1. System setup
  1. Select a polynomial number of the Bluetooth devices named as 1, 2, …, and n. Determine the bit length of DHKey denoted as k1 and the bit length of MacKey denoted as k2. Let k = min( k1, k2) be the security parameter.

  2. (Optional) Set the available storage capacity for the pairing information table in the Bluetooth device.

 Phase 2. Learning
  • 3.

    For any Bluetooth device in {1, 2, …, n}, the adversary π’œ can call the oracles defined in Section 5.2.1. The following oracles are polynomially invoked with interleaved order.

  • 3.1.

    π’œ calls the oracles OPA = {Execute, Result} to act as the PA.

  • 3.2.

    π’œ calls the oracles OAA = {Init, Send, Reveal, Corrupt} to act as the AA.

 Phase 3. Challenge
  • 4.

    π’œ selects a challenge Bluetooth device A ∈ {1, 2, …, n} and any other Bluetooth device B ∈ {1, 2, …, n}. Here, the oracle Corrupt (Ξ A,B) or the oracle Corrupt (Ξ B,A) is not allowed during the learning phase, if the compromised DHKey exists in both devices’ pairing information tables.

  • 5.

    π’œ calls the oracle Test (A, B).

  • 6.

    π’œ outputs his guessing bit bβ€².

π’œ wins if b = bβ€².