RFID Authentication Scheme Based on Hyperelliptic Curve Signcryption

نویسندگان

چکیده

The implementation of efficient security mechanisms for Radio Frequency Identification (RFID) system has always been a continuous challenge due to its limited computing resources. Previously, hash-based, symmetric-key cryptography-based and elliptic curve cryptography based protocols were proposed RFID system. However, these are not suitable because some them failed fulfil the requirements, produce high computational overhead. Recently researchers have focused on developing an mechanism Hyper Elliptic Curve Cryptography (HECC) which provides with 80 bits lower-key size. In this paper, we propose authentication scheme (RFID-AS) hyperelliptic Signcryption. RFID-AS required features as well from potential attacks. We validated by using formal analysis techniques, such Real-Or-Random (ROR) model Automated Validation Internet Security Protocols Applications (AVISPA). Furthermore, results reveal that computational, communication storage overheads is much less than other recently schemes. Compared most published work ECC Signcryption, our 70% in terms overhead, 42.7% 57.7% Therefore, more compared domain. Hence, it attractive solution resource-limited devices like tags.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ECGSC: Elliptic Curve based Generalized Signcryption Scheme

Signcryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and encryption. The definition of generalized signcryption is proposed in the paper firstly. Generalized signcryption has a special feature that provides confidentiality or authenticity separately under the condition of specific inputs. So it is more useful than common ones. Based on ECDSA...

متن کامل

A Study on signcryption Scheme Based on Eliptic Curve

Data exchange is more essential to share information in the age of information technology to achieve the different tasks. As the transmission media is unreliable it need protection of that data moves in an unsecure communication network is a crucial issue for the reason that it may get tempered by third party [1]. Everyone desires their messages must be travel in the network in a secure fashion...

متن کامل

RFID Mutual Authentication Scheme based on Synchronized

Radio Frequency IDentification (RFID) is an automatic identification system, relying on storing and remotely retrieving data about objects we want to manage using devices called “RFID tag”. Even though RFID system is widely useful for industrial and individual applications, RFID tag has a serious privacy problem, i.e., traceability. To protect users from tracing, we propose an RFID mutual authe...

متن کامل

A Signcryption Scheme based on Elliptic Curve Cryptography

In Public key cryptography a message is sent after applying the digital signature and encryption techniques by the sender. These techniques are used so that the message properties such as confidentiality, integrity and unforgeability are maintained and the non-repudiation can be ensured at the receiving end. The digital signatures and encryption mechanisms can be combined to form a single logic...

متن کامل

A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing attacks. In addition, the asymmetric key based systems usually suffer from impersonation, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2021

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2021.3069429