A Scalable and Provably Secure Hash-Based RFID Protocol.
Gildas AvoinePhilippe OechslinPublished in: PerCom Workshops (2005)
Keyphrases
- provably secure
- hash functions
- standard model
- security model
- blind signature
- key management
- public key
- signature scheme
- bilinear pairings
- similarity search
- blind signature scheme
- low cost
- authentication protocol
- rfid tags
- rfid systems
- diffie hellman
- data distribution
- partially blind signature scheme
- security requirements
- threshold signature scheme
- image compression