Two Mutual Authentication Protocols Based on Zero-Knowledge Proofs for RFID Systems

Author(s):  
Hafsa Assidi ◽  
Edoukou Berenger Ayebie ◽  
El Mamoun Souidi
2008 ◽  
Vol 5 (4) ◽  
pp. 348-365 ◽  
Author(s):  
Ashrar A. Omer ◽  
Johnson P. Thomas ◽  
Ling Zhu

2013 ◽  
Vol 380-384 ◽  
pp. 2831-2836
Author(s):  
Hong He ◽  
Qi Li ◽  
Zhi Hong Zhang

In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.


2014 ◽  
Vol 543-547 ◽  
pp. 2255-2261
Author(s):  
Bing Zhang ◽  
Zhi Guang Qin ◽  
Guo Gen Wan ◽  
Xin Xin Ma

This document analyzes the security drawback of the Hash-based algorithm authentication protocols which is frequently used in low-cost RFID systems, and proposes a lightweight mutual authentication protocol. In the proposed protocol, all authenticated information is encrypted , the location privacy is also provided by refreshing an identifier of a tag in each session and lost massages can be recovered from many attacks such as spoofing attacks. The comparison result of the simulation experiment and the formal correctness proof of the proposed authentication protocol is based on BAN logic. It shows that the proposed protocol in this article greatly enhance the capability of verifiability, confidentiality and integrality, it also corrects the existing Hash-based protocol secure deficiency so that it is more suitable for low-cost RFID systems than those existing ones.


Author(s):  
Ahmed Patel ◽  
Kenan Kalajdzic ◽  
Laleh Golafshan ◽  
Mona Taghavi

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely limited in processing power and memory space. This paper describes a design and implementation of a software library providing smart card application developers with a reliable authentication mechanism based on well-known zero-knowledge authentication schemes. Java Card is used as the target smart card platform implementation based on the evaluation of the Fiat-Shamir (F-S) and Guillou-Quisquater (G-Q) protocols under various performance criteria are presented to show the effectiveness of the implementation and that G-Q is a more efficient protocol.


Sign in / Sign up

Export Citation Format

Share Document