@inproceedings{2c71a42d657a4ed28b9a6d3947ab4dd3,
title = "An RFID path authentication protocol based on chebyshev polynomials",
abstract = "Radio Frequency Identification (RFID) technology has a wild range of applications in the industrial supply-chain. In particular an RFID path authentication protocol can be used to detect whether the products labeled with RFID tags have passed a complete and valid path and whether any counterfeit products have entered our supply system. In this paper, we first apply Chebyshev polynomials to RFID path authentication protocol in the supply chain. Our proposed protocol not only satisfies the three well-known security requirements (the privacy, path unlinkability and tag unlinkability), but also provides a simple identity authentication protocol between readers and tags. Further the states of tags are allowed to be exposed due to the use of Chebyshev polynomials. Compared with other related protocols, our proposed protocol reduces the calculation time and has a lower memory requirement of tags.",
keywords = "Chebyshev polynomials, Cryptography protocol, Data security, Path authentication, RFID",
author = "Zuming Shen and Peng Zeng",
note = "Publisher Copyright: {\textcopyright} Springer Nature Switzerland AG 2019.; International Conference on Applications and Techniques in Cyber Intelligence, ATCI 2018 ; Conference date: 11-07-2018 Through 13-07-2018",
year = "2019",
doi = "10.1007/978-3-319-98776-7\_3",
language = "英语",
isbn = "9783319987750",
series = "Advances in Intelligent Systems and Computing",
publisher = "Springer Verlag",
pages = "17--27",
editor = "Mohammed Atiquzzaman and Zheng Xu and Jemal Abawajy and Choo, \{Kim-Kwang Raymond\} and Rafiqul Islam",
booktitle = "International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 - Applications and Techniques in Cyber Security and Intelligence",
address = "德国",
}