2021
DOI: 10.1109/access.2021.3069429
|View full text |Cite
|
Sign up to set email alerts
|

RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption

Abstract: The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based security protocols were proposed for RFID system. However, these protocols are not suitable because some of them failed to fulfil the RFID security requirements, and some of them produce high computational overhead. Recently researchers hav… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…It is intended to alleviate the shortcomings of lightweight protocols utilizing asymmetric components, such RSA [30,31], pairing [3,32,33] or ECC [34][35][36][37][38][39]. However, those primitives are time-consuming; therefore, they might not be the best option for devices with limited resources.…”
Section: Related Workmentioning
confidence: 99%
“…It is intended to alleviate the shortcomings of lightweight protocols utilizing asymmetric components, such RSA [30,31], pairing [3,32,33] or ECC [34][35][36][37][38][39]. However, those primitives are time-consuming; therefore, they might not be the best option for devices with limited resources.…”
Section: Related Workmentioning
confidence: 99%
“…At the beginning of the mission, a blockchain client program is deployed for the registration server and the candidate UAVs participating in the mission to initialize the UAV network in a secure environment with the registration server as the center. e registration server constructs the UAV network mission-related security environment parameters based on the hyperelliptic curve public key cryptosystem [27] (HECC), receives UAV registration requests, generates public and private keys and identity IDs, and builds the identity vector. e vector commitment is calculated based on the identity vector, and the identity witness of the corresponding UAV is generated at the same time.…”
Section: Recommended Schemementioning
confidence: 99%
“…The RFID-based authentication approach using hyperelliptic curve signcryption (HCS) is used in [19]. The HCS uses an 80-bit key with a high-security feature to tolerate potential attacks.…”
Section: Introductionmentioning
confidence: 99%