Nothing Special   »   [go: up one dir, main page]

Burmester et al., 2011 - Google Patents

Lightweight RFID authentication with forward and backward security

Burmester et al., 2011

View PDF
Document ID
3010857933186286623
Author
Burmester M
Munilla J
Publication year
Publication venue
ACM Transactions on Information and System Security (TISSEC)

External Links

Snippet

We propose a lightweight RFID authentication protocol that supports forward and backward security. The only cryptographic mechanism that this protocol uses is a pseudorandom number generator (PRNG) that is shared with the backend Server. Authentication is …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords

Similar Documents

Publication Publication Date Title
Burmester et al. Lightweight RFID authentication with forward and backward security
Juels et al. Authenticating pervasive devices with human protocols
Burmester et al. Universally composable RFID identification and authentication protocols
Niu et al. Privacy and authentication protocol for mobile RFID systems
Yilmaz et al. ARMOR: An anti-counterfeit security Mechanism for lOw cost Radio frequency identification systems
Munilla et al. Attacks on ownership transfer scheme for multi-tag multi-owner passive RFID environments
Anandhi et al. An authentication protocol to track an object with multiple RFID tags using cloud computing environment
Burmester et al. A flyweight RFID authentication protocol
Hristea et al. Destructive privacy and mutual authentication in Vaudenay’s RFID model
Shariq et al. URASP: An ultralightweight RFID authentication scheme using permutation operation
Hristea et al. A PUF-based destructive private mutual authentication RFID protocol
Tounsi et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems
Maurya et al. Quadratic residue-based unilateral authentication protocol for RFID system
Li et al. SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
Gope et al. QR-PUF: Design and implementation of a RFID-based secure inpatient management system using XOR-arbiter-PUF and QR-code
Yang et al. A privacy model for RFID tag ownership transfer
Rostampour et al. An authenticated encryption based grouping proof protocol for RFID systems
Moazami et al. TBGODP^+ TBGODP+: improvement of TBGODP, a time bound group ownership delegation protocol
Chen et al. A secure RFID authentication protocol adopting error correction code
Shi et al. The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security
Shariq et al. Anonymous and reliable ultralightweight RFID-enabled authentication scheme for IoT systems in cloud computing
Ren et al. An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol.
Liang et al. A novel lightweight PUF-based RFID mutual authentication protocol
Maarof et al. Security analysis of low cost RFID systems
Munilla et al. Enhanced ownership transfer protocol for RFID in an extended communication model