Design of anonymous authentication protocol for RFID

Safety requirements for RFID protocols were analyzed,and a low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode.The protocol was proven secure in the standard model.The new protocol provides anonymity,mutual authentication and concurrent...

Full description

Saved in:
Bibliographic Details
Main Authors: DENG Miao-lei, MA Jian-feng, ZHOU Li-hua
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74652259/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841537632024133632
author DENG Miao-lei
MA Jian-feng
ZHOU Li-hua
author_facet DENG Miao-lei
MA Jian-feng
ZHOU Li-hua
author_sort DENG Miao-lei
collection DOAJ
description Safety requirements for RFID protocols were analyzed,and a low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode.The protocol was proven secure in the standard model.The new protocol provides anonymity,mutual authentication and concurrent security,and its implementation is feasible for a wide range of RFID architectures.
format Article
id doaj-art-8fe2c0b9d8b34d9ea5ff3d45a4814c2d
institution Kabale University
issn 1000-436X
language zho
publishDate 2009-01-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-8fe2c0b9d8b34d9ea5ff3d45a4814c2d2025-01-14T08:28:58ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2009-01-0130202674652259Design of anonymous authentication protocol for RFIDDENG Miao-leiMA Jian-fengZHOU Li-huaSafety requirements for RFID protocols were analyzed,and a low cost anonymous authentication protocol for RFID was proposed based on the universally composable security mode.The protocol was proven secure in the standard model.The new protocol provides anonymity,mutual authentication and concurrent security,and its implementation is feasible for a wide range of RFID architectures.http://www.joconline.com.cn/zh/article/74652259/RFID systemauthentication protocoluniversal compositionanonymity
spellingShingle DENG Miao-lei
MA Jian-feng
ZHOU Li-hua
Design of anonymous authentication protocol for RFID
Tongxin xuebao
RFID system
authentication protocol
universal composition
anonymity
title Design of anonymous authentication protocol for RFID
title_full Design of anonymous authentication protocol for RFID
title_fullStr Design of anonymous authentication protocol for RFID
title_full_unstemmed Design of anonymous authentication protocol for RFID
title_short Design of anonymous authentication protocol for RFID
title_sort design of anonymous authentication protocol for rfid
topic RFID system
authentication protocol
universal composition
anonymity
url http://www.joconline.com.cn/zh/article/74652259/
work_keys_str_mv AT dengmiaolei designofanonymousauthenticationprotocolforrfid
AT majianfeng designofanonymousauthenticationprotocolforrfid
AT zhoulihua designofanonymousauthenticationprotocolforrfid