메뉴 건너뛰기




Volumn 70, Issue 2, 2014, Pages 987-1001

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

Author keywords

Authentication protocol; Elliptic curve; Random oracle model; RFID; Untraceable privacy

Indexed keywords

AUTHENTICATION; AUTOMATION; CLONE CELLS; GEOMETRY; PUBLIC KEY CRYPTOGRAPHY;

EID: 84919877584     PISSN: 09208542     EISSN: 15730484     Source Type: Journal    
DOI: 10.1007/s11227-014-1272-0     Document Type: Article
Times cited : (45)

References (35)
  • 2
    • 34748832806 scopus 로고    scopus 로고
    • Defining strong privacy for RFID. Cryptology ePrint Archive
    • Juels A, Weis S (2006) Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137
    • (2006) Report , vol.2006 , Issue.137
    • Juels, A.1    Weis, S.2
  • 3
    • 70349155465 scopus 로고    scopus 로고
    • Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security
    • Cai S, Li Y, Li T, Deng RH (2009) Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security, pp 51–58
    • (2009) pp 51–58
    • Cai, S.1    Li, Y.2    Li, T.3    Deng, R.H.4
  • 4
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566
    • (2011) Comput Commun , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 5
    • 84903725812 scopus 로고    scopus 로고
    • Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun
    • Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun. doi:10.1007/s11277-014-1605-6
    • (2014) doi:10.1007/s11277-014-1605-6
    • Niu, B.1    Zhu, X.2    Chi, H.3    Li, H.4
  • 7
    • 84894523791 scopus 로고    scopus 로고
    • Improvement of the hash-based RFID mutual authentication protocol. Wirel Pers Commun
    • Dehkordi MH, Farzaneh Y (2013) Improvement of the hash-based RFID mutual authentication protocol. Wirel Pers Commun. doi:10.1007/s11277-013-1358-7
    • (2013) doi:10.1007/s11277-013-1358-7
    • Dehkordi, M.H.1    Farzaneh, Y.2
  • 8
    • 84889098244 scopus 로고    scopus 로고
    • Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol
    • Safkhani M, Peris-Lopez P, Hernandez-Castro JC, Bagheri N (20174) Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J Comput Appl Math 259(1):571–577
    • J Comput Appl Math , vol.259 , Issue.1 , pp. 571-577
    • Safkhani, M.1    Peris-Lopez, P.2    Hernandez-Castro, J.C.3    Bagheri, N.4
  • 9
    • 84903597022 scopus 로고    scopus 로고
    • Simulation-based traceability analysis of RFID authentication protocols, Wirel Pers Commun:
    • Alagheband MR, Aref MR (2013) Simulation-based traceability analysis of RFID authentication protocols. Wirel Pers Commun. doi:10.1007/s11277-013-1552-7
    • (2013) Aref MR
    • Alagheband, M.R.1
  • 10
    • 84872223019 scopus 로고    scopus 로고
    • A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards
    • Chen CL, Huang YC, Shih TF (2012) A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards. Inf Technol Control 41(3):220–228
    • (2012) Inf Technol Control , vol.41 , Issue.3 , pp. 220-228
    • Chen, C.L.1    Huang, Y.C.2    Shih, T.F.3
  • 11
    • 84878975743 scopus 로고    scopus 로고
    • Secure indefinite-index RFID authentication scheme with challenge-response strategy
    • Kuo WC, Chen BL, Wuu LC (2013) Secure indefinite-index RFID authentication scheme with challenge-response strategy. Inf Technol Control 42(2):124–130
    • (2013) Inf Technol Control , vol.42 , Issue.2 , pp. 124-130
    • Kuo, W.C.1    Chen, B.L.2    Wuu, L.C.3
  • 12
    • 84880314449 scopus 로고    scopus 로고
    • Unified privacy analysis of newfound RFID authentication protocols
    • Alagheband MR, Aref MR (2013) Unified privacy analysis of newfound RFID authentication protocols. Secur Commun Netw 6(8):999–1009
    • (2013) Secur Commun Netw , vol.6 , Issue.8 , pp. 999-1009
    • Alagheband, M.R.1    Aref, M.R.2
  • 15
    • 84919879124 scopus 로고    scopus 로고
    • N.N.I., Technology of Standards: Cryptographic hash algorithm competition
    • N.N.I., Technology of Standards: Cryptographic hash algorithm competition. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
  • 16
    • 80053220372 scopus 로고    scopus 로고
    • Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
    • Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755–1768
    • (2011) IET Commun , vol.5 , Issue.12 , pp. 1755-1768
    • Ning, H.1    Liu, H.2    Mao, J.3    Zhang, Y.4
  • 17
    • 84863515660 scopus 로고    scopus 로고
    • Scalable RFID systems: a privacy-preserving protocol with constant-time identification
    • Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536–1550
    • (2012) IEEE Trans Parallel Distrib Syst , vol.23 , Issue.8 , pp. 1536-1550
    • Alomair, B.1    Clark, A.2    Cuellar, J.3    Poovendran, R.4
  • 18
    • 78049383154 scopus 로고    scopus 로고
    • Privacy versus scalability in radio frequency identification systems
    • Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155–2163
    • (2010) Comput Commun , vol.33 , Issue.18 , pp. 2155-2163
    • Alomair, B.1    Poovendran, R.2
  • 19
    • 79151469014 scopus 로고    scopus 로고
    • Scalable RFID security protocols supporting tag ownership transfer
    • Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566
    • (2011) Comput Commun , vol.34 , Issue.4 , pp. 556-566
    • Song, B.1    Mitchell, C.J.2
  • 20
    • 84860886134 scopus 로고    scopus 로고
    • Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
    • Batina L, Lee YK, Seys S, Singele D, Verbauwhede I (2012) Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers Ubiquitous Comput 16(3):323–335
    • (2012) Pers Ubiquitous Comput , vol.16 , Issue.3 , pp. 323-335
    • Batina, L.1    Lee, Y.K.2    Seys, S.3    Singele, D.4    Verbauwhede, I.5
  • 21
    • 84907591223 scopus 로고    scopus 로고
    • An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput
    • Chou JS (2013) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput. doi:10.1007/s11227-013-1073-x
    • (2013) doi:10.1007/s11227-013-1073-x
    • Chou, J.S.1
  • 23
    • 84919879122 scopus 로고
    • Efficient identification and signatures for smart cards. In: Advances in cryptology (CRYPTO’89)
    • Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Advances in cryptology (CRYPTO’89), pp 239–252
    • (1990) pp 239–252
    • Schnorr, C.P.1
  • 25
    • 84875762817 scopus 로고
    • Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology (CRYPTO’92)
    • Okamoto T (1993) Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology (CRYPTO’92), pp 31–53
    • (1993) pp 31–53
    • Okamoto, T.1
  • 26
    • 49049105964 scopus 로고    scopus 로고
    • EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: IEEE international conference on RFID
    • Lee YK, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: IEEE international conference on RFID, pp 97–104
    • (2008) pp 97–104
    • Lee, Y.K.1    Batina, L.2    Verbauwhede, I.3
  • 27
    • 75649122972 scopus 로고    scopus 로고
    • Low-cost digital signature architecture suitable for radio frequency identification tags
    • O’Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14–26
    • (2010) Comput Digital Tech IET , vol.4 , Issue.1 , pp. 14-26
    • O’Neill, M.1    Robshaw, M.J.2
  • 28
    • 77957684720 scopus 로고    scopus 로고
    • Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS)
    • Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), pp 650–657
    • (2010) pp 650–657
    • Godor, G.1    Giczi, N.2    Imre, S.3
  • 29
    • 79955735535 scopus 로고    scopus 로고
    • Vulnerability of two multiple-key agreement protocols
    • Farash MS, Bayat M, Attari MA (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204
    • (2011) Comput Electr Eng , vol.37 , Issue.2 , pp. 199-204
    • Farash, M.S.1    Bayat, M.2    Attari, M.A.3
  • 30
    • 84899624931 scopus 로고    scopus 로고
    • A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings
    • Farash MS, Attari MA, Bayat M (2012) A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325
    • (2012) IACSIT Int J Eng Technol , vol.4 , Issue.3 , pp. 321-325
    • Farash, M.S.1    Attari, M.A.2    Bayat, M.3
  • 31
    • 84876280558 scopus 로고    scopus 로고
    • A new efficient authenticated multiple-key exchange protocol from bilinear pairings
    • Farash MS, Attari MA, Atani RE, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541
    • (2013) Comput Electr Eng , vol.39 , Issue.2 , pp. 530-541
    • Farash, M.S.1    Attari, M.A.2    Atani, R.E.3    Jami, M.4
  • 32
    • 84902245219 scopus 로고    scopus 로고
    • Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
    • Farash MS, Attari MA (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inf Secur 5(1):1–15
    • (2013) ISC Int J Inf Secur , vol.5 , Issue.1 , pp. 1-15
    • Farash, M.S.1    Attari, M.A.2
  • 33
    • 84893678218 scopus 로고    scopus 로고
    • A pairing-free ID-based key agreement protocol with different PKGs
    • Farash MS, Attari MA (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148
    • (2014) Int J Netw Secur , vol.16 , Issue.2 , pp. 143-148
    • Farash, M.S.1    Attari, M.A.2
  • 34
    • 84902778355 scopus 로고    scopus 로고
    • An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
    • Farash MS, Attari MA (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43(2):143–150
    • (2014) Inf Technol Control , vol.43 , Issue.2 , pp. 143-150
    • Farash, M.S.1    Attari, M.A.2
  • 35
    • 84903725812 scopus 로고    scopus 로고
    • Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun
    • Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun. doi:10.1007/s11277-014-1605-6
    • (2014) doi:10.1007/s11277-014-1605-6
    • Niu, B.1    Zhu, X.2    Chi, H.3    Li, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.