메뉴 건너뛰기




Volumn 69, Issue 10, 2009, Pages 848-853

ECC-based lightweight authentication protocol with untraceability for low-cost RFID

Author keywords

Anonymity; Authentication; EPCglobal; Error correction code; RFID; Security

Indexed keywords

ANONYMITY; EPCGLOBAL; ERROR CORRECTION CODE; RFID; SECURITY;

EID: 68849120029     PISSN: 07437315     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.jpdc.2009.07.007     Document Type: Article
Times cited : (60)

References (49)
  • 1
    • 0030287972 scopus 로고    scopus 로고
    • Security of private-key encryption based on array codes
    • Al Jabri A. Security of private-key encryption based on array codes. Electronics Letters 32 24 (1996) 2226-2227
    • (1996) Electronics Letters , vol.32 , Issue.24 , pp. 2226-2227
    • Al Jabri, A.1
  • 4
    • 33747058795 scopus 로고    scopus 로고
    • Security implications in RFID and authentication processing framework
    • Ayoade J. Security implications in RFID and authentication processing framework. Computers & Security 25 (2006) 207-212
    • (2006) Computers & Security , vol.25 , pp. 207-212
    • Ayoade, J.1
  • 5
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notations of security for public key Encryption schemes
    • Proceedings of CRYPTO'98, Springer-Verlag
    • Bellare M., Desai A., Pointcheval D., and Rogaway P. Relations among notations of security for public key Encryption schemes. Proceedings of CRYPTO'98. LNCS vol. 1462 (1998), Springer-Verlag 26-45
    • (1998) LNCS , vol.1462 , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 6
    • 68849109681 scopus 로고    scopus 로고
    • Attacking and defending the mceliece cryptosystem, cryptology ePrint Archive
    • Report 2008/318
    • D.J. Bernstein, T. Lange, C. Peters, Attacking and defending the mceliece cryptosystem, cryptology ePrint Archive: Report 2008/318
    • Bernstein, D.J.1    Lange, T.2    Peters, C.3
  • 7
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    • Springer, Berlin
    • Berson T.A. Failure of the McEliece public-key cryptosystem under message-resend and related-message attack. Advances in Cryptology - CRYPTO 97 (1997), Springer, Berlin 213-220
    • (1997) Advances in Cryptology - CRYPTO 97 , pp. 213-220
    • Berson, T.A.1
  • 10
    • 68849112148 scopus 로고    scopus 로고
    • Secure access control schemes for RFID systems with anonymity
    • May 9, Japan
    • H.Y. Chien, Secure access control schemes for RFID systems with anonymity, in: Proceedings of FMUIT'06, May 9, Japan, 2006
    • (2006) Proceedings of FMUIT'06
    • Chien, H.Y.1
  • 12
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards
    • Chien H.Y., and Chen C.H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computers Standards and Interfaces 29/2 Feb. (2007) 254-259
    • (2007) Computers Standards and Interfaces , vol.29-2 , Issue.Feb , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 14
    • 68849109435 scopus 로고    scopus 로고
    • Cryptanalysis on LMAP, M2AP and Li-Wang's scheme
    • ChiaYi, Taiwan
    • H.Y. Chien, Hwang, Cryptanalysis on LMAP, M2AP and Li-Wang's scheme, Information Security Conference 2007, ChiaYi, Taiwan, 2007
    • (2007) Information Security Conference
    • Chien, H.Y.1    Hwang2
  • 17
    • 80054802288 scopus 로고    scopus 로고
    • A summary of McEliece-type cryptosystems and their security, Cryptology ePrint Archive
    • Report 2006/162, URL
    • D. Engelbert, R. Overbeck, A. Schmidt, A summary of McEliece-type cryptosystems and their security, Cryptology ePrint Archive: Report 2006/162, 2006. URL http://eprint.iacr.org/2006/162
    • (2006)
    • Engelbert, D.1    Overbeck, R.2    Schmidt, A.3
  • 18
    • 84891359925 scopus 로고    scopus 로고
    • EPCglobal.http://www.epcglobalinc.org/
    • EPCglobal
  • 19
    • 33144487342 scopus 로고    scopus 로고
    • An active attack against HB+-A provably secure lightweight authentication protocol, Cryptology ePrint Archive
    • Report 2005/237
    • H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+-A provably secure lightweight authentication protocol, Cryptology ePrint Archive, Report 2005/237, 2005
    • (2005)
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 20
    • 2942625823 scopus 로고    scopus 로고
    • A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153
    • A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153
  • 21
    • 70349284581 scopus 로고    scopus 로고
    • Secure human identification protocols
    • Advances in Cryptology - ASIACRYPT 2001, Springer
    • Hopper N.J., and Blum M. Secure human identification protocols. Advances in Cryptology - ASIACRYPT 2001. LNCS vol. 2248 (2001), Springer 52-66
    • (2001) LNCS , vol.2248 , pp. 52-66
    • Hopper, N.J.1    Blum, M.2
  • 22
  • 23
    • 33745181952 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • Advances in Cryptology - Crypto'05, Springer
    • Juels A., and Weis S.A. Authenticating pervasive devices with human protocols. Advances in Cryptology - Crypto'05. LNCS vol. 3126 (2005), Springer 293-308
    • (2005) LNCS , vol.3126 , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 25
    • 84937393537 scopus 로고    scopus 로고
    • Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC
    • PKC, Springer
    • Kobara K., and Imai H. Semantically secure McEliece public-key cryptosystems-conversions for McEliece PKC. PKC. LNCS vol. 1992 (2001), Springer 19-35
    • (2001) LNCS , vol.1992 , pp. 19-35
    • Kobara, K.1    Imai, H.2
  • 26
    • 34548815120 scopus 로고    scopus 로고
    • Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?
    • Austria, July
    • S.S. Kumar, C. Paar, Are standards compliant Elliptic Curve Cryptosystems feasible on RFID?, in: Proceedings of Workshop on RFID Security, Austria, July 2006
    • (2006) Proceedings of Workshop on RFID Security
    • Kumar, S.S.1    Paar, C.2
  • 28
    • 38149008857 scopus 로고    scopus 로고
    • Cryptanalysis of EPC class 1 generation 2 RFID authentication
    • ChiaYi, Taiwan
    • C.-L. Lin, K.C. Chang, Cryptanalysis of EPC class 1 generation 2 RFID authentication, Information Security Conference 2007, ChiaYi, Taiwan, 2007
    • (2007) Information Security Conference
    • Lin, C.-L.1    Chang, K.C.2
  • 31
    • 68849131737 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory, 42-44. URL
    • R.J. McEliece, A public-key cryptosystem based on algebraic coding theory, 1978, Jet Propulsion Laboratory DSN Progress Report 42-44. URL http://ipnpr.jpl.nasa.gov/progressreport2/42-44/44N.PDF
    • (1978) Jet Propulsion Laboratory DSN Progress Report
    • McEliece, R.J.1
  • 34
    • 0346895307 scopus 로고    scopus 로고
    • Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems
    • Park C.S. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems. Computer Networks 44 2 (2004) 267-273
    • (2004) Computer Networks , vol.44 , Issue.2 , pp. 267-273
    • Park, C.S.1
  • 36
    • 33750067948 scopus 로고    scopus 로고
    • M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags
    • Proc. of International Conference on Ubiquitous Intelligence and Computing. UIC'06, Springer
    • Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., and Ribagorda A. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags. Proc. of International Conference on Ubiquitous Intelligence and Computing. UIC'06. LNCS vol. 4159 (2006), Springer 912-923
    • (2006) LNCS , vol.4159 , pp. 912-923
    • Peris-Lopez, P.1    Hernandez-Castro, J.C.2    Estevez-Tapiador, J.M.3    Ribagorda, A.4
  • 39
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID tag/reader authentication
    • June
    • S. Piramuthu, HB and related lightweight authentication protocols for secure RFID tag/reader authentication, CollECTeR Europe Conference, June 2006
    • (2006) CollECTeR Europe Conference
    • Piramuthu, S.1
  • 40
    • 85024311289 scopus 로고
    • Private-key algebraic-coded cryptosystems
    • Springer, Berlin
    • Rao T.R.N., and Nam K.H. Private-key algebraic-coded cryptosystems. Advances in Cryptology-CRYPTO 86 (1987), Springer, Berlin 35-48
    • (1987) Advances in Cryptology-CRYPTO 86 , pp. 35-48
    • Rao, T.R.N.1    Nam, K.H.2
  • 41
    • 24644501824 scopus 로고    scopus 로고
    • K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing, SPC 2005, 2005, pp. 70-84
    • K. Rhee, J. Kwak, S. Kim, D. Won, Challenge-response based RFID authentication protocol for distributed database environment, in: International Conference on Security in Pervasive Computing, SPC 2005, 2005, pp. 70-84
  • 42
    • 32444435813 scopus 로고    scopus 로고
    • Radio frequency identification
    • Robert C.M. Radio frequency identification. Computers and Security 25 (2006) 18-26
    • (2006) Computers and Security , vol.25 , pp. 18-26
    • Robert, C.M.1
  • 44
    • 84956862729 scopus 로고
    • The Rao-Nam scheme is insecure against a chosen-plaintext attack
    • Springer, Berlin
    • Struik R., and Tilburg J. The Rao-Nam scheme is insecure against a chosen-plaintext attack. Advances in Cryptology - CRYPTO 87 (1988), Springer, Berlin 445-457
    • (1988) Advances in Cryptology - CRYPTO 87 , pp. 445-457
    • Struik, R.1    Tilburg, J.2
  • 47
    • 35048876270 scopus 로고    scopus 로고
    • Security and privacy aspects of low-cost radio frequency identification systems
    • In the Proceedings of the First Security in Pervasive Computing
    • Weis S.A., Sarma S.E., Rivest R.L., and Engels D.W. Security and privacy aspects of low-cost radio frequency identification systems. In the Proceedings of the First Security in Pervasive Computing. LNCS vol. 2802 (2003) 201-212
    • (2003) LNCS , vol.2802 , pp. 201-212
    • Weis, S.A.1    Sarma, S.E.2    Rivest, R.L.3    Engels, D.W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.