@inproceedings{33414c6e3d224157adacc26cedcf441f,
title = "A pre-computable signature scheme with efficient verification for RFID",
abstract = "Passive RFID tags have limited rewritable memory for data storage and limited computation power, which pose difficulties to implement security protection on RFID tags. It has been shown that strong security and privacy protections for RFID require utilizing public-key cryptography. Unfortunately, the implementation of public key cryptography is infeasible in low-cost passive tags. With this issue in mind, in this work, we propose a pre-computable signature scheme with a very efficient signature verification algorithm for RFID applications. Our signature scheme is provably secure under the DDH assumption and a variant of q-SDH assumption. With pre-computations, no exponentiation is required in our signature verification. Our research shows that it is feasible for low-cost RFID tags to verify signatures with the basic modular multiplication only (if they have a small amount of writable memory).",
author = "Fuchun Guo and Yi Mu and Willy Susilo and Vijay Varadharajan",
year = "2012",
doi = "10.1007/978-3-642-29101-2_1",
language = "English",
isbn = "9783642291005",
volume = "7232",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer, Springer Nature",
pages = "1--16",
editor = "Ryan, {Mark D.} and Ben Smyth and Guilin Wang",
booktitle = "Information Security Practice and Experience - 8th International Conference, ISPEC 2012, Proceedings",
address = "United States",
note = "8th International Conference on Information Security Practice and Experience, ISPEC 2012 ; Conference date: 09-04-2012 Through 12-04-2012",
}