In [19], a privacy-preserving tag authentication protocol for
RFID systems is proposed. This protocol provides destructive
privacy in the Vaudenay-Model [23]. The authors in [19]
mprove the weak private protocol proposed in [23] by using
(PUFs) as secure key storage like the protocol in [22]. This
means that the secret key which is not stored in the tag is
derived from PUF whenever needed. In the Vaudenay-Model,
a destructive adversary is allowed to corrupt the tag under
the condition that after an adversary obtains its internal state,
the tag is destroyed and cannot be used again. Therefore,
an adversary tampering a tag equipped with the PUF cannot
obtain the tag secret because the corruption of the tag result
in the destruction of PUF and therefore the tag secret