메뉴 건너뛰기




Volumn 57, Issue 14, 2013, Pages 2705-2717

Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices

Author keywords

Authentication; Error correction code; Rabin cryptosystem; RFID; Security

Indexed keywords

ANONYMOUS AUTHENTICATION; AUTHENTICATION SCHEME; COMPUTING CAPACITY; ERROR CORRECTION CODES; RABIN CRYPTOSYSTEM; RFID AUTHENTICATION; SECURE AUTHENTICATIONS; SECURITY;

EID: 84883234825     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2013.06.005     Document Type: Article
Times cited : (18)

References (56)
  • 1
    • 84883256395 scopus 로고    scopus 로고
    • (accessed 10.10.12).
    • EPCglobal. < http://www.epcglobalinc.org/ > (accessed 10.10.12).
  • 4
    • 68849120029 scopus 로고    scopus 로고
    • ECC-based lightweight authentication protocol with untraceability for low-cost RFID
    • H.Y. Chien, and C.S. Laih ECC-based lightweight authentication protocol with untraceability for low-cost RFID Journal of Parallel and Distributed Computing 69 2009 848 853
    • (2009) Journal of Parallel and Distributed Computing , vol.69 , pp. 848-853
    • Chien, H.Y.1    Laih, C.S.2
  • 7
    • 2942625823 scopus 로고    scopus 로고
    • Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers
    • A.D. Henrici, P. MÄuller, Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers, in: Proceedings of PerSec'04 at IEEE PerCom, 2004, pp.149-153.
    • (2004) Proceedings of PerSec'04 at IEEE PerCom , pp. 149-153
    • Henrici, A.D.1
  • 8
    • 68849086667 scopus 로고    scopus 로고
    • Strengthening EPC tag against cloning
    • A. Juels, Strengthening EPC tag against cloning, in: Proceedings of WiSe '05, 2005.
    • (2005) Proceedings of WiSe '05
    • Juels, A.1
  • 18
    • 55749098453 scopus 로고    scopus 로고
    • New mutual agreement protocol to secure mobile RFID-enabled devices
    • N. Lo, K.-H. Yeh, and C.Y. Yeun New mutual agreement protocol to secure mobile RFID-enabled devices Information Security Technical Report 13 2008 151 157
    • (2008) Information Security Technical Report , vol.13 , pp. 151-157
    • Lo, N.1    Yeh, K.-H.2    Yeun, C.Y.3
  • 19
    • 33751546328 scopus 로고    scopus 로고
    • Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
    • H.Y. Chien, and C.H. Chen Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards Computers Standards and Interfaces 29/2 February 2007 254 259
    • (2007) Computers Standards and Interfaces , vol.292 , Issue.FEBRUARY , pp. 254-259
    • Chien, H.Y.1    Chen, C.H.2
  • 20
    • 33747058795 scopus 로고    scopus 로고
    • Security implications in RFID and authentication processing framework
    • J. Ayoade Security implications in RFID and authentication processing framework Computers & Security 25 2006 207 212
    • (2006) Computers & Security , vol.25 , pp. 207-212
    • Ayoade, J.1
  • 21
  • 22
    • 30344469114 scopus 로고    scopus 로고
    • Authenticating pervasive devices with human protocols
    • LNCS Springer
    • A. Juels, and S.A. Weis Authenticating pervasive devices with human protocols Advances in Cryptology - Crypto'05 LNCS vol. 3126 2005 Springer 293 308
    • (2005) Advances in Cryptology - Crypto'05 , vol.3126 VOL. , pp. 293-308
    • Juels, A.1    Weis, S.A.2
  • 23
    • 33144487342 scopus 로고    scopus 로고
    • An Active Attack against HB+-A Provably Secure Lightweight Authentication Protocol
    • Report 2005/237
    • H. Gilbert, M. Robshaw, H. Sibert, An Active Attack against HB+-A Provably Secure Lightweight Authentication Protocol, Cryptology ePrint Archive, Report 2005/237, 2005.
    • (2005) Cryptology EPrint Archive
    • Gilbert, H.1    Robshaw, M.2    Sibert, H.3
  • 25
    • 36249031858 scopus 로고    scopus 로고
    • HB and related lightweight authentication protocols for secure RFID Tag/Reader authentication
    • S. Piramuthu, HB and related lightweight authentication protocols for secure RFID Tag/Reader authentication, in: CollECTeR Europe Conference, 2006.
    • (2006) CollECTeR Europe Conference
    • Piramuthu, S.1
  • 30
    • 57849147967 scopus 로고    scopus 로고
    • Security analysis of two ultra-lightweight RFID authentication protocols
    • T. Li, G. Wang, Security analysis of two ultra-lightweight RFID authentication protocols, in; IFIP SEC 2007, 2007.
    • (2007) IFIP SEC 2007
    • Li, T.1    Wang, G.2
  • 32
    • 46749130059 scopus 로고    scopus 로고
    • A novel mutual authentication scheme based on quadratic residues for RFID systems
    • Y. Chen, J.S. Chou, and H.M. Sun A novel mutual authentication scheme based on quadratic residues for RFID systems Computer Networks 52 2008 2373 2380
    • (2008) Computer Networks , vol.52 , pp. 2373-2380
    • Chen, Y.1    Chou, J.S.2    Sun, H.M.3
  • 34
    • 77949562527 scopus 로고    scopus 로고
    • Cryptanalysis of some RFID authentication protocols
    • T. Cao, and P. Shen Cryptanalysis of some RFID authentication protocols Journal of Communications 3 7 2008 20 27
    • (2008) Journal of Communications , vol.3 , Issue.7 , pp. 20-27
    • Cao, T.1    Shen, P.2
  • 36
    • 36248982045 scopus 로고    scopus 로고
    • SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
    • H.-Y. Chien SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity IEEE Transactions on Dependable and Secure Computing 4 4 2007 337 340
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.4 , pp. 337-340
    • Chien, H.-Y.1
  • 37
    • 84865741288 scopus 로고    scopus 로고
    • A minimum disclosure approach to authentication and privacy in RFID systems
    • R. Doss, W. Zhou, S. Sundaresan, S. Yu, and L. Gao A minimum disclosure approach to authentication and privacy in RFID systems Computer Networks 56 2012 3401 3416
    • (2012) Computer Networks , vol.56 , pp. 3401-3416
    • Doss, R.1    Zhou, W.2    Sundaresan, S.3    Yu, S.4    Gao, L.5
  • 39
    • 84957629783 scopus 로고    scopus 로고
    • Relations among notations of security for public key encryption schemes
    • LNCS Springer-Verlag
    • M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway Relations among notations of security for public key encryption schemes Proceedings of CRYPTO'98 LNCS vol. 1462 1998 Springer-Verlag 26 45
    • (1998) Proceedings of CRYPTO'98 , vol.1462 VOL. , pp. 26-45
    • Bellare, M.1    Desai, A.2    Pointcheval, D.3    Rogaway, P.4
  • 41
    • 84958666890 scopus 로고    scopus 로고
    • Failure of the McEliece public-key cryptosystem under message-resend and related-message attack
    • Springer Berlin
    • T.A. Berson Failure of the McEliece public-key cryptosystem under message-resend and related-message attack Advances in Cryptology - CRYPTO97 1997 Springer Berlin 213 220
    • (1997) Advances in Cryptology - CRYPTO97 , pp. 213-220
    • Berson, T.A.1
  • 43
    • 84956862729 scopus 로고
    • The Rao-Nam scheme is insecure against a chosen-plaintext attack
    • Springer Berlin
    • R. Struik, and J. Tilburg The Rao-Nam scheme is insecure against a chosen-plaintext attack Advances in Cryptology - CRYPTO87 1988 Springer Berlin 445 457
    • (1988) Advances in Cryptology - CRYPTO87 , pp. 445-457
    • Struik, R.1    Tilburg, J.2
  • 47
    • 68949181328 scopus 로고    scopus 로고
    • Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
    • E.Y. Choi, D.H. Lee, and J.I. Lim Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems Computer Standards & Interfaces 31 6 2009 1124 1130
    • (2009) Computer Standards & Interfaces , vol.31 , Issue.6 , pp. 1124-1130
    • Choi, E.Y.1    Lee, D.H.2    Lim, J.I.3
  • 49
    • 84883212261 scopus 로고    scopus 로고
    • < > (accessed 01.10.12).
    • Wikipedia, Decoding methods. < http://en.wikipedia.org/wiki/Decoding- methods > (accessed 01.10.12).
    • Wikipedia, Decoding Methods
  • 50
    • 84883258689 scopus 로고    scopus 로고
    • < > (accessed 01.10.12).
    • The Mifare cards. < http://www.mifare.net/ > (accessed 01.10.12).
    • The Mifare Cards
  • 51
    • 34548831373 scopus 로고    scopus 로고
    • A new montgomery modular multiplication algorithm and its VLSI design for RSA cryptosystem
    • J.-H. Chen, H.-S. Wu, M.-D. Shieh, W.-C. Lin, A new montgomery modular multiplication algorithm and its VLSI design for RSA cryptosystem, in: Proc. ISCAS 2007, pp.3780-3783.
    • Proc. ISCAS 2007 , pp. 3780-3783
    • Chen, J.-H.1    Wu, H.-S.2    Shieh, M.-D.3    Lin, W.-C.4
  • 52
    • 21644431783 scopus 로고    scopus 로고
    • Fast montgomery modular multiplication by pipelined CSA architecture
    • K. Manochehri, S. Pourmozafari, Fast montgomery modular multiplication by pipelined CSA architecture, in: Proc. ICM 2004, pp. 144-147.
    • Proc. ICM 2004 , pp. 144-147
    • Manochehri, K.1    Pourmozafari, S.2
  • 53
    • 84883242418 scopus 로고    scopus 로고
    • ISO/IEC FCD 15693-3 (accessed 24.03.13).
    • ISO/IEC FCD 15693-3, 2009. < http://www.iso.org/iso/home/store/ catalogue-tc/catalogue-detail.htm?csnumber=43467 > (accessed 24.03.13).
    • (2009)
  • 56
    • 84883229765 scopus 로고    scopus 로고
    • (accessed 25.05.13).
    • Alibaba on-line market. < http://www.alibaba.com > (accessed 25.05.13).
    • Alibaba On-line Market


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.