RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions.
Seung-Jae JangYoung-Hoon JungSo Yeon MinKeun-Wang LeeMoon-Seog JunPublished in: FGIT-GDC (2011)
Keyphrases
- mutual authentication
- key exchange
- hash functions
- security analysis
- encryption scheme
- secret key
- key distribution
- diffie hellman
- authentication protocol
- secure communication
- public key
- similarity search
- security properties
- authentication scheme
- smart card
- standard model
- security requirements
- ciphertext
- key management
- private key
- signature scheme
- digital signature
- data distribution
- secret sharing scheme
- low cost
- database
- group communication
- high dimensional
- trusted third party
- databases