RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption
نویسندگان
چکیده
The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based protocols were proposed RFID system. However, these are not suitable because some them failed fulfil the requirements, produce high computational overhead. Recently researchers have focused on developing an mechanism Hyper Elliptic Curve Cryptography (HECC) which provides with 80 bits lower-key size. In this paper, we propose authentication scheme (RFID-AS) hyperelliptic Signcryption. RFID-AS required features as well from potential attacks. We validated by using formal analysis techniques, such Real-Or-Random (ROR) model Automated Validation Internet Security Protocols Applications (AVISPA). Furthermore, results reveal that computational, communication storage overheads is much less than other recently schemes. Compared most published work ECC Signcryption, our 70% in terms overhead, 42.7% 57.7% Therefore, more compared domain. Hence, it attractive solution resource-limited devices like tags.
منابع مشابه
ECGSC: Elliptic Curve based Generalized Signcryption Scheme
Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and encryption. The definition of generalized signcryption is proposed in the paper firstly. Generalized signcryption has a special feature that provides confidentiality or authenticity separately under the condition of specific inputs. So it is more useful than common ones. Based on ECDSA...
متن کاملA Study on signcryption Scheme Based on Eliptic Curve
Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure communication network is a crucial issue for the reason that it may get tempered by third party [1]. Everyone desires their messages must be travel in the network in a secure fashion...
متن کاملRFID Mutual Authentication Scheme based on Synchronized
Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...
متن کاملA Signcryption Scheme based on Elliptic Curve Cryptography
In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...
متن کاملA Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing attacks. In addition, the asymmetric key based systems usually suffer from impersonation, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3069429