메뉴 건너뛰기




Volumn 52, Issue 12, 2008, Pages 2373-2380

A novel mutual authentication scheme based on quadratic residues for RFID systems

Author keywords

Forward secrecy; Location privacy; Mutual authentication; Privacy; Quadratic residue assumption; RFID system; Tag anonymity

Indexed keywords

ACCESS CONTROL; ALUMINUM; AUTHENTICATION; CRYPTOGRAPHY; NETWORK PROTOCOLS; STANDARDS;

EID: 46749130059     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2008.04.016     Document Type: Article
Times cited : (121)

References (21)
  • 1
    • 2942560605 scopus 로고    scopus 로고
    • A. Juels, Yoking-Proofs for RFID tags, in: Proceedings of IEEE International Conference Digital Object Identifier, 2004, pp. 138-143.
    • A. Juels, Yoking-Proofs for RFID tags, in: Proceedings of IEEE International Conference Digital Object Identifier, 2004, pp. 138-143.
  • 2
    • 46749152684 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • Chien H.Y., and Chen C.H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. Computer Standards & Interfaces (2006)
    • (2006) Computer Standards & Interfaces
    • Chien, H.Y.1    Chen, C.H.2
  • 3
    • 33645857377 scopus 로고    scopus 로고
    • Cryptography and authentication on RFID passive tags for apparel products
    • Wong K.H.M., Hui P.C.L., and Chan A.C.K. Cryptography and authentication on RFID passive tags for apparel products. Computer in Industry 57 (2005) 342-349
    • (2005) Computer in Industry , vol.57 , pp. 342-349
    • Wong, K.H.M.1    Hui, P.C.L.2    Chan, A.C.K.3
  • 4
    • 46749115236 scopus 로고    scopus 로고
    • S. Sarma, S. Weis, D. Engels, RFID system, security and privacy implications, in: White Paper, MIT Auto-ID Center, November 2002.
    • S. Sarma, S. Weis, D. Engels, RFID system, security and privacy implications, in: White Paper, MIT Auto-ID Center, November 2002.
  • 5
    • 35048876270 scopus 로고    scopus 로고
    • S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing 2003. LNCS no. 2802, 2004, pp. 201-212.
    • S.A. Weis, S.E. Sarma, R.L. Rivest, D.W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, in: Security in Pervasive Computing 2003. LNCS no. 2802, 2004, pp. 201-212.
  • 6
    • 46749153105 scopus 로고    scopus 로고
    • EPCglobal web site, .
    • EPCglobal web site, .
  • 7
    • 46749086750 scopus 로고    scopus 로고
    • D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006.
    • D.N. Duc, J. Park, H. Lee, K. Kim, Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning, in: The 2006 Symposium on Cryptography and Information Security, 2006.
  • 8
    • 2942625823 scopus 로고    scopus 로고
    • A.D. Henrici, P. Mauller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE PerCom, 2004, pp. 149-153.
    • A.D. Henrici, P. Mauller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: IEEE PerCom, 2004, pp. 149-153.
  • 9
    • 33745938362 scopus 로고    scopus 로고
    • S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67.
    • S. Karthikeyan, M. Nesterenko, RFID security without extensive cryptography, in: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67.
  • 10
    • 14844294769 scopus 로고    scopus 로고
    • D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: Conference on Computer and Communications Security CCS'04, 2004, pp. 210-219.
    • D. Molnar, D. Wagner, Privacy and security in library RFID: issues, practices, and architectures, in: Conference on Computer and Communications Security CCS'04, 2004, pp. 210-219.
  • 11
    • 46749113131 scopus 로고    scopus 로고
    • M. Ohkubo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, in: RFID Privacy Workshop, 2003.
    • M. Ohkubo, K. Suzki, S. Kinoshita, Cryptographic approach to privacy-friendly tags, in: RFID Privacy Workshop, 2003.
  • 12
    • 24644501824 scopus 로고    scopus 로고
    • K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84.
    • K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing SPC 2005, pp. 70-84.
  • 13
    • 46749155167 scopus 로고    scopus 로고
    • J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005.
    • J. Yang, J. Park, H. Lee, K. Ren, K. Kim, Mutual authentication protocol for low-cost RFID, in: Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005.
  • 14
    • 46749131966 scopus 로고    scopus 로고
    • J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, in: The 2005 Symposium on Cryptography and Information Security.
    • J. Yang, K. Ren, K. Kim, Security and privacy on authentication protocol for low-cost radio, in: The 2005 Symposium on Cryptography and Information Security.
  • 16
    • 46749121517 scopus 로고    scopus 로고
    • W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman, 1987.
    • W. Patterson, Mathematical Cryptology for Computer Scientists and Mathematicians, Rowman, 1987.
  • 17
    • 14544276998 scopus 로고    scopus 로고
    • E. Thompson, MD5 collisions and the impact on computer forensics, in: Digital Investigation 2005, pp. 36-40.
    • E. Thompson, MD5 collisions and the impact on computer forensics, in: Digital Investigation 2005, pp. 36-40.
  • 18
    • 46749145046 scopus 로고    scopus 로고
    • A. Shamir, Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags, in: Invited Talk, International Conference on RFID Security (RFIDSec'07), 2007.
    • A. Shamir, Squash: A new one-way hash function with provable security properties for highly constrained devices such as RFID tags, in: Invited Talk, International Conference on RFID Security (RFIDSec'07), 2007.
  • 19
    • 46749128639 scopus 로고    scopus 로고
    • M. Burmester, B. Medeiros, R. Motta, Robust, Anonymous RFID Authentication with Constant Key-Lookup," , 2007.
    • M. Burmester, B. Medeiros, R. Motta, Robust, Anonymous RFID Authentication with Constant Key-Lookup," , 2007.
  • 20
    • 33750067948 scopus 로고    scopus 로고
    • P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Rib-agorda, M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags, in: Proceedings of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4195, Springer-Verlag, 2006, pp. 912-923.
    • P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, A. Rib-agorda, M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags, in: Proceedings of International Conference on Ubiquitous Intelligence and Computing UIC'06, LNCS 4195, Springer-Verlag, 2006, pp. 912-923.
  • 21
    • 46749145440 scopus 로고    scopus 로고
    • G. Avoine, E. Dysli, P. Oechslin, Reducing time complexity in RFID systems, in: The 12th Annual Workshop on Selected Areas in Cryptography (SAC), 2005.
    • G. Avoine, E. Dysli, P. Oechslin, Reducing time complexity in RFID systems, in: The 12th Annual Workshop on Selected Areas in Cryptography (SAC), 2005.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.