2008
DOI: 10.1007/978-3-540-85893-5_12
|View full text |Cite
|
Sign up to set email alerts
|

Coupon Recalculation for the GPS Authentication Scheme

Abstract: Abstract. Equipping branded goods with RFID tags is an effective measure to fight the growing black market of counterfeit products. Asymmetric cryptography is the technology of choice to achieve strong authentication but suffers from its ample demand of area and power resources. The GPS authentication scheme showed that a coupon-based approach can cope with the limited resources of passive RFID tags. This article extends the idea of coupons by recalculating coupons during the idle time of tags when they are po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2009
2009
2012
2012

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…As in [8], we can construct an RFID system which allows a precomputation in a tag. The contents of the input for the computation of a of our proposed protocol do not have any information from the reader.…”
Section: Efficiencymentioning
confidence: 99%
“…As in [8], we can construct an RFID system which allows a precomputation in a tag. The contents of the input for the computation of a of our proposed protocol do not have any information from the reader.…”
Section: Efficiencymentioning
confidence: 99%
“…There are several variants and optimizations of the GPS protocol [2][3][4][5][6][7]. A series of optimizations is realized to ease computation and storage costs.…”
Section: Related Workmentioning
confidence: 99%
“…A series of optimizations is realized to ease computation and storage costs. The variants of GPS protocol [3] are mainly based on complete (full) coupon, or partial coupon [11], or coupon-re-calculation [4]. Due to the use of coupons, the authentication of the tag can be performed "onthe-fly" during authentication phase.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Since then, many attempts have been made to implement standardized cryptographic algorithms in hardware complying with the requirements of passive RFID tags. Among the most popular publications on that are realizations of the Advanced Encryption Standard (AES) [6], Elliptic-Curve Cryptography (ECC) [3,8], and GPS [9,15].…”
Section: Introductionmentioning
confidence: 99%