Abstract:
We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetric-key cryptography, and therefore, it is well-suited to resou...Show MoreMetadata
Abstract:
We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetric-key cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the provers are low-cost RFID tags, and the number of the tags can potentially be very large. We analyze the proposed scheme and show that it is superior to the well-known key-tree based approach for private authentication both in terms of privacy and efficiency.
Published in: 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks
Date of Conference: 18-21 June 2007
Date Added to IEEE Xplore: 22 October 2007
ISBN Information: