PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.
Daisuke MoriyamaShin'ichiro MatsuoMoti YungPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- mutual authentication
- authentication protocol
- authentication mechanism
- security analysis
- user authentication
- identity management
- rfid tags
- authentication scheme
- security mechanisms
- data encryption
- password authentication
- rfid systems
- key distribution
- secure communication
- secure manner
- factor authentication
- security requirements
- security issues
- smart card
- integrity verification
- information leakage
- low cost
- privacy protection
- supply chain
- privacy preserving
- radio frequency identification rfid
- resource constrained
- secret key
- key management
- security services
- user privacy
- public key cryptography
- key agreement protocol
- private key
- encryption decryption
- memory requirements
- radio frequency identification
- operating system
- access control
- biometric authentication