Implementing public-key cryptography on passive RFID tags is practical.
Alex ArbitYoel LivneYossef OrenAvishai WoolPublished in: Int. J. Inf. Sec. (2015)
Keyphrases
- public key
- rfid tags
- public key cryptography
- rfid reader
- radio frequency identification
- low cost
- digital signature
- lightweight
- security model
- security analysis
- rfid technology
- provably secure
- private key
- public key infrastructure
- rfid systems
- diffie hellman
- authentication protocol
- security issues
- elliptic curve
- security protocols
- mobile phone
- ciphertext
- encryption scheme
- cost effective