Secure Human Identification Protocols
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks
SECPERU '06 Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing
An efficient forward private RFID protocol
Proceedings of the 16th ACM conference on Computer and communications security
Aggregate message authentication codes
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
History-free aggregate message authentication codes
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Authenticating pervasive devices with human protocols
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
Reducing time complexity in RFID systems
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications
Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
In this paper, we focus on designing of path-checking protocols to verify the valid paths in supply chains. By inputting a valid path, the reader at the check point is able to verify whether the tags have passed through the valid path or not. we propose a path-checking solution based on sequential aggregate message authentication codes. For security and privacy considerations, we add mutual authentication into path-checking protocols. In order to save resources, we use SQUASH as message authentication codes which is considered to be suited for RFID systems. Finally, we do some security and privacy analysis.