RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption.
Usman AliMohd Yamani Idna Bin IdrisMohamad Nizam Bin AyubInsaf UllahIhsan AliTarak NandyMuktar YahuzaNauman KhanPublished in: IEEE Access (2021)
Keyphrases
- authentication scheme
- mutual authentication
- key management
- secret key
- public key
- smart card
- rfid tags
- signcryption scheme
- authentication protocol
- trusted third party
- security analysis
- user authentication
- security properties
- private key
- low cost
- bilinear pairings
- security flaws
- key distribution
- rfid technology
- digital signature
- rfid systems
- resource constrained
- wireless sensor networks
- security services
- diffie hellman
- provably secure
- elliptic curve
- security protocols
- lightweight
- feature extraction
- real time