Login / Signup
One-round provably secure yoking-proof for RFID applications.
Da-Zhi Sun
Ze-Guang Zhu
Guangquan Xu
Wei Guo
Published in:
Concurr. Comput. Pract. Exp. (2019)
Keyphrases
</>
provably secure
standard model
key management
security model
public key
signature scheme
hash functions
rfid tags
partially blind signature scheme
blind signature
low cost
diffie hellman
blind signature scheme
bilinear pairings
resource constrained
end to end
wireless sensor networks