2016
DOI: 10.1007/978-3-319-49151-6_18
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Tag Path Authentication Protocol with Less Tag Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…After the first proposal on the static path authentication by Blass and Kaoutar, the protocol construction and privacy has been significantly improved by Cai et al and later by Wang et al All of them use ElGamal re‐encryption with symmetric key to encrypt the tag identity.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…After the first proposal on the static path authentication by Blass and Kaoutar, the protocol construction and privacy has been significantly improved by Cai et al and later by Wang et al All of them use ElGamal re‐encryption with symmetric key to encrypt the tag identity.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, the security requirements of an RFID ownership transfer protocol, [6][7][8] where the ownership of a tag needs to be transferred securely, are very close to that of path authentication protocols. 5,[9][10][11] However, in comparison with the ownership transfer protocol, the path authentication protocol demands additional privacy requirements such as forward privacy, where former executions must not be traced by the current owner, and backward privacy, where the succeeding transaction should not be traced by the former owner. 5 Besides that, some recent works have been inspired by path authentication protocol, 12,13 but they are not exactly path authentication schemes or are different from the objective of path authentication schemes.…”
Section: Introductionmentioning
confidence: 99%