[go: up one dir, main page]

Akleylek et al., 2022 - Google Patents

A new lattice-based authentication scheme for IoT

Akleylek et al., 2022

Document ID
369841110329144255
Author
Akleylek S
Soysaldı M
Publication year
Publication venue
Journal of Information Security and Applications

External Links

Snippet

In this paper, we propose a lattice-based authentication scheme for IoT technologies such as RFID systems. The security of the proposed scheme is based on ISIS problem which helps to resist to quantum attacks. The proposed scheme satisfies zero-knowledge property …
Continue reading at www.sciencedirect.com (other versions)

Similar Documents

Publication Publication Date Title
Al-Zubaidie et al. Efficient and secure ECDSA algorithm and its applications: A survey
Dinarvand et al. An efficient and secure RFID authentication protocol using elliptic curve cryptography
Salem et al. A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS
Akleylek et al. A new lattice-based authentication scheme for IoT
EP1261903B2 (en) Method of authenticating users of software
Ding et al. A lightweight anonymous authentication protocol for resource-constrained devices in Internet of Things
Sathya et al. A comprehensive study of blockchain services: future of cryptography
Chien et al. ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Benssalah et al. An efficient RFID authentication scheme based on elliptic curve cryptography for Internet of Things
Huang A new design of access control in wireless sensor networks
Ali et al. RFID authentication scheme based on hyperelliptic curve signcryption
Sharma et al. Advanced multi-factor user authentication scheme for E-governance applications in smart cities
Chien Elliptic curve cryptography-based RFID authentication resisting active tracking
Benssalah et al. A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m‐health environments
Arslan et al. A secure and privacy friendly ECC based RFID authentication protocol for practical applications
Ko et al. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety
Ryu et al. On elliptic curve based untraceable RFID authentication protocols
Fanfara et al. Usage of asymmetric encryption algorithms to enhance the security of sensitive data in secure communication
Hölzl et al. Bridging the gap in privacy-preserving revocation: practical and scalable revocation of mobile eIDs
Martínez et al. A secure elliptic curve-based RFID protocol
Hölzl et al. Disposable dynamic accumulators: toward practical privacy-preserving mobile eIDs with scalable revocation
Shabani et al. An intelligent RFID-enabled authentication protocol in VANET
Chen et al. A secure RFID authentication protocol adopting error correction code
Mamun et al. A fully-secure RFID authentication protocol from exact LPN assumption
Ozaif et al. A secure and efficient identity-based RFID mutual Authentication scheme for IoT using elliptic curve cryptography