Akleylek et al., 2022 - Google Patents
A new lattice-based authentication scheme for IoTAkleylek et al., 2022
- Document ID
- 369841110329144255
- Author
- Akleylek S
- Soysaldı M
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
In this paper, we propose a lattice-based authentication scheme for IoT technologies such as RFID systems. The security of the proposed scheme is based on ISIS problem which helps to resist to quantum attacks. The proposed scheme satisfies zero-knowledge property …
- 241000764238 Isis 0 abstract 1
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Al-Zubaidie et al. | Efficient and secure ECDSA algorithm and its applications: A survey | |
Dinarvand et al. | An efficient and secure RFID authentication protocol using elliptic curve cryptography | |
Salem et al. | A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS | |
Akleylek et al. | A new lattice-based authentication scheme for IoT | |
EP1261903B2 (en) | Method of authenticating users of software | |
Ding et al. | A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things | |
Sathya et al. | A comprehensive study of blockchain services: future of cryptography | |
Chien et al. | ECC-based lightweight authentication protocol with untraceability for low-cost RFID | |
Benssalah et al. | An efficient RFID authentication scheme based on elliptic curve cryptography for Internet of Things | |
Huang | A new design of access control in wireless sensor networks | |
Ali et al. | RFID authentication scheme based on hyperelliptic curve signcryption | |
Sharma et al. | Advanced multi-factor user authentication scheme for E-governance applications in smart cities | |
Chien | Elliptic curve cryptography-based RFID authentication resisting active tracking | |
Benssalah et al. | A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m‐health environments | |
Arslan et al. | A secure and privacy friendly ECC based RFID authentication protocol for practical applications | |
Ko et al. | Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety | |
Ryu et al. | On elliptic curve based untraceable RFID authentication protocols | |
Fanfara et al. | Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication | |
Hölzl et al. | Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs | |
Martínez et al. | A secure elliptic curve-based RFID protocol | |
Hölzl et al. | Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation | |
Shabani et al. | An intelligent RFID-enabled authentication protocol in VANET | |
Chen et al. | A secure RFID authentication protocol adopting error correction code | |
Mamun et al. | A fully-secure RFID authentication protocol from exact LPN assumption | |
Ozaif et al. | A secure and efficient identity-based RFID mutual Authentication scheme for IoT using elliptic curve cryptography |