RFID System Security Using Identity-Based Cryptography

被引:2
|
作者
Chen, Youqin [1 ]
Chen, Zhide [1 ]
Xu, Li [1 ]
机构
[1] Fujian Normal Univ, Sch Math & Comp Sci, Fuzhou 350007, Fujian Province, Peoples R China
关键词
RFID; Secure Two-way Authentication Protocol; Learning Parity in the Presence of Noise; HB; HB+; HB++;
D O I
10.1109/IITSI.2010.52
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Two-way authentication is one of the key solutions to improve the security of RFID Tag/Reader due to many attacks on HB, HB+ and HB++. In this paper, we analysis HB, HB+ and HB++ and propose a modified protocol, a two-way authentication to avoid the attacks.
引用
收藏
页码:460 / 464
页数:5
相关论文
共 50 条
  • [21] Securing Topology Control in SDWSNs Using Identity-Based Cryptography
    Wang, Rui
    Liu, Donglan
    Liu, Xin
    Chen, Jianfei
    Ma, Lei
    Wang, Yong
    Zhang, Hao
    Yu, Hao
    Su, Bing
    Zhang, Fangzhe
    Sun, Lili
    JOURNAL OF SENSORS, 2023, 2023
  • [22] Cross-platform Identity-based Cryptography using WebAssembly
    Vecsi, Adam
    Bagossy, Attila
    Petho, Attila
    INFOCOMMUNICATIONS JOURNAL, 2019, 11 (04): : 31 - 38
  • [23] Improved TLS Handshake Protocols Using Identity-based Cryptography
    Peng, Changyan
    Zhang, Quan
    Tang, Chaojing
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 135 - 139
  • [24] Multi-identity management for identity-based cryptography
    Guo, Fuchun
    Mu, Yi
    Chen, Zhide
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2008, 11 (06): : 639 - 672
  • [25] Design of Secure and Independent Controllable Email System Based on Identity-Based Cryptography
    Xuan, Jiaxing
    Wang, Dong
    Li, Zhiqi
    Zhang, Shuxian
    2016 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2016, : 217 - 222
  • [26] Research on Application of Blockchain and Identity-Based Cryptography
    Zhu, Xingxiong
    Fan, Tao
    2018 4TH INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND MATERIAL APPLICATION, 2019, 252
  • [27] Identity-based cryptography in public key management
    Yum, DH
    Lee, PJ
    PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
  • [28] Simple identity-based cryptography with mediated RSA
    Ding, XH
    Tsudik, G
    TOPICS IN CRYPTOLOGY - CT-RSA 2003, PROCEEDINGS, 2003, 2612 : 193 - 210
  • [29] Identity-Based Threshold Cryptography for Electronic Voting
    Gallegos-Garcia, Gina
    Gomez-Cardenas, Roberto
    Duchen-Sanchez, Gonzalo I.
    PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON DATA NETWORKS, COMMUNICATIONS, COMPUTERS (DNCOCO '09), 2009, : 135 - +
  • [30] Private Communication Based on Hierarchical Identity-Based Cryptography
    Kalyani, D.
    Sridevi, R.
    EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 749 - 756