RFID security authentication scheme based on Montgomery-form elliptic curve cryptography

For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was...

Full description

Saved in:
Bibliographic Details
Main Author: Wumei ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2016-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016107/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529910450978816
author Wumei ZHANG
author_facet Wumei ZHANG
author_sort Wumei ZHANG
collection DOAJ
description For the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.
format Article
id doaj-art-b33ebdf2737f43f3a47a01ef80ad6c12
institution Kabale University
issn 1000-0801
language zho
publishDate 2016-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-b33ebdf2737f43f3a47a01ef80ad6c122025-01-15T03:14:55ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012016-05-013212112659608941RFID security authentication scheme based on Montgomery-form elliptic curve cryptographyWumei ZHANGFor the issues that the existing RFID security authentication scheme based on elliptic curve cryptography (ECC)can not meet the requirements of mutual authentication,privacy protection and forward security,a RFID security authentication scheme based on Montgomery-form elliptic curve cryptography was proposed.This scheme uses the Montgomery elliptic curve to reduce the amount of computation,and to provide mutual authentication between the label and the server,and anonymity and forward security.The analysis showed that the scheme could resist replay attack,tag camouflage attack,server cheat attack,DoS attack,position tracking attack and clone attack.Compared with the existing schemes,the proposed scheme provides high security performance under low memory,computation and communication requirements,and it can meet the security requirements of the RFID system.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016107/RFIDsecurity authenticationelliptic curve cryptographyMontgomeryforward security
spellingShingle Wumei ZHANG
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
Dianxin kexue
RFID
security authentication
elliptic curve cryptography
Montgomery
forward security
title RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
title_full RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
title_fullStr RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
title_full_unstemmed RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
title_short RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
title_sort rfid security authentication scheme based on montgomery form elliptic curve cryptography
topic RFID
security authentication
elliptic curve cryptography
Montgomery
forward security
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2016107/
work_keys_str_mv AT wumeizhang rfidsecurityauthenticationschemebasedonmontgomeryformellipticcurvecryptography