Journal on Communications ›› 2014, Vol. 35 ›› Issue (11): 132-138.doi: 10.11959/j.issn.1000-436x.2014.11.015

• security protocol • Previous Articles     Next Articles

Edwards curves based security authentication protocol for mobile RFID systems

Yu-long YANG1,2,Chang-gen PENG2,3(),Zhou ZHOU1,2,Xiao-pei ZHANG2   

  1. 1 College of Computer Science & Information,Guizhou University,Guiyang 550025,China
    2 Institute of Cryptography & Data Security,Guizhou University,Guiyang 550025,China
    3 College of Science,Guizhou University,Guiyang 550025,China
  • Online:2014-11-25 Published:2017-06-20
  • Supported by:
    The National Natural Science Foundation of China;The National Science Foundation of Guizhou Province;The Special Scientific Research Facilities Fund for High-Level Talents in Guizhou Province

Abstract:

Existing work about RFID authentication protocols is usually difficult to adapt to mobile RFID systems.In order to solve the problem,an Edwards curves based security authentication protocol for mobile RFID systems is proposed.The protocol can improve the ability of resisting the side channel attacks by using the Edwards curve and the elliptic curve discrete logarithm problem is applied to implement safety certification.Further the tag and reader’s untraceable privacy is proved by using the provable security method,the security analysis shows that the protocol can be more effective against for various attacks which have existed.Compared with the existing structure similar to RFID authentication protocol,the protocol has better scalability and its security and performance is superior to other solutions.

Key words: mobile RFID systems, Edwards, security authentication, privacy protection, provable security

No Suggested Reading articles found!