2022
DOI: 10.1109/jiot.2021.3138557
|View full text |Cite
|
Sign up to set email alerts
|

An RFID Zero-Knowledge Authentication Protocol Based on Quadratic Residues

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…However, Tu et al [24] conducted a security assessment of the protocol and identified security loopholes that could result in attacks such as replay, tracking, and simulated tag attack. To address these issues, Song et al [25] proposed a quadratic residue-based zero-knowledge authentication protocol with active tags that have zero-knowledge properties. (3) RFID authentication protocols based on grouping-proof To achieve fast authentication in large-scale RFID systems, Rahman et al [26] proposed a group-based anonymous privacy authentication protocol to achieve batch authentication.…”
Section: Related Workmentioning
confidence: 99%
“…However, Tu et al [24] conducted a security assessment of the protocol and identified security loopholes that could result in attacks such as replay, tracking, and simulated tag attack. To address these issues, Song et al [25] proposed a quadratic residue-based zero-knowledge authentication protocol with active tags that have zero-knowledge properties. (3) RFID authentication protocols based on grouping-proof To achieve fast authentication in large-scale RFID systems, Rahman et al [26] proposed a group-based anonymous privacy authentication protocol to achieve batch authentication.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme is safe under replay and desynchronization attacks. However, Adeli et al [42] showed that their Song et al [34] proposed a quadratic residues-based RFID zeroknowledge authentication protocol named ZKAP. They uses a secure cryptographic hash function ℎ(⋅), 𝐸(⋅) 𝑘 /𝐷(⋅) 𝑘 , quadratic residues, and zero-knowledge proof approaches.…”
Section: Literature Reviewmentioning
confidence: 99%
“…IoT (IIoT) [58][59][60]; • Systems of automatic identification of objects using RFID tags [61][62][63]; • Vehicular ad-hoc networks (VANET) [64][65][66].…”
mentioning
confidence: 99%