[1] The Commission of the European Communities. Commission recommendation of 12 May 2009 on the implementation of privacy and data protection principles in applications supported by radio-frequency identification[EB/OL]. (2009-05-12)[2016-12-05]. https://ec.europa.eu/digital-singlemarket/en/news/commission-recommendation-12-may-2009-implementation-privacyand-data-protection-prin-ciples/. [2] BATINA L, GUAJARDO J, KERINS T, et al. Public-key cryptography for RFID-tags[C]//PerCom Workshops' 07:Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway, NJ:IEEE, 2007:217-222. [3] FURBASS F, WOLKERSTORFER J. ECC processor with low die size for RFID applications[C]//ISCAS 2007:Proceedings of the 2007 IEEE International Symposium on Circuits and Systems. Piscataway, NJ:IEEE, 2007:1835-1838. [4] HEIN D, WOLKERSTORFER J, FELBER N. ECC is ready for RFID-a proof in silicon[C]//SAC 2008:Proceedings of the 2008 International Workshop on Selected Areas in Cryptography, LNCS 5381. Berlin:Springer-Verlag, 2008:401-413. [5] LEE Y K, SAKIYAMA K, BATINA L, et al. Elliptic-curve-based security processor for RFID[J]. IEEE Transactions on Computers, 2008, 57(11):1514-1527. [6] LIU D, LIU Z, YONG Z, et al. Design and implementation of an ECC-based digital baseband controller for RFID tag chip[J]. IEEE Transactions on Industrial Electronics, 2015, 62(7):4365-4373. [7] PENDL C, PELNAR M, HUTTER M. Elliptic curve cryptography on the WISP UHF RFID tag[C]//RFIDSec 2011:Proceedings of the 2011 International Workshop on Radio Frequency Identification:Security and Privacy Issues, LNCS 7055. Berlin:Springer-Verlag, 2011:32-47. [8] TUYLS P, BATINA L. RFID-tags for anti-counterfeiting[C]//CT-RSA'06:Proceedings of the 2006 Cryptographers' Track at the RSA Conference on Topics in Cryptology, LNCS 3860. Berlin:Springer-Verlag, 2006:115-131. [9] CHOU J-S. An efficient mutual authentication RFID scheme based on elliptic curve cryptography[J]. Journal of Supercomputing, 2014, 70(1):75-94. [10] FARASH M S. Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography[J]. Journal of Supercomputing, 2014, 70(2):987-1001. [11] ZHANG Z, QI Q. An efficient RFID authentication protocol to enhance patient medication safety using elliptic curve cryptography[J]. Journal of Medical Systems, 2014, 38(5):47. [12] FARASH M S, NAWAZ O, MAHMOOD K, et al. A provably secure RFID authentication protocol based on elliptic curve for healthcare environments[J]. Journal of Medical Systems, 2016, 40(7):165. [13] HE D, KUMAR N, CHILAMKURTI N, et al. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol[J]. Journal of Medical Systems, 2014, 38(10):116. [14] LEE C-I, CHIEN H-Y. An elliptic curve cryptography-based RFID authentication securing E-health system[J]. International Journal of Distributed Sensor Networks, 2015, 2015:Article No. 251. [15] LIAO Y-P, HSIAO C-M. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J]. Ad Hoc Networks, 2014, 18:133-146. [16] ZHAO Z. A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2014, 38(5):46. [17] MOOSAVI S R, NIGUSSIE E, VIRTANEN S, et al. An elliptic curve-based mutual authentication scheme for RFID implant systems[J]. Procedia Computer Science, 2014, 32:198-206. [18] KHATWANI C, ROY S. Security analysis of ECC based authentication protocols[C]//CICN 2015:Proceedings of the 2015 International Conference on Computational Intelligence and Communication Networks. Piscataway, NJ:IEEE, 2015:1167-1172. [19] ELKHIYAOUI K, BLASS E-O, MOLVA R. ROTIV:RFID ownership transfer with issuer verification[C]//RFIDSec 2011:Proceedings of the 2011 International Workshop on Radio Frequency Identification:Security and Privacy Issues, LNCS 7055. Berlin:Springer-Verlag, 2011:163-182. [20] XIN W, GUAN Z, YANG T, et al. An efficient privacy-preserving RFID ownership transfer protocol[C]//APWeb 2013:Proceedings of the 2013 Asia-Pacific Web Conference on Web Technologies and Applications, LNCS 7808. Berlin:Springer-Verlag, 2013:538-549. [21] KOBLITZ N. Elliptic curve cryptosystems[J]. Mathematics of Computation, 1987, 48(177):203-209. [22] MILLER V S. Use of elliptic curves in cryptography[C]//CRYPTO 1985:Proceedings of the 1985 Conference on the Theory and Application of Cryptographic Techniques, LNCS 218. Berlin:Springer-Verlag, 1985:417-426. [23] 邓元庆,龚晶,石会.密码学简明教程[M].北京:清华大学出版社,2011:125-129. (DENG Y Q, GONG J, SHI H. Concise Course in Cryptography[M]. Beijing:Tsinghua University Press, 2011:125-129. [24] MERKLE R C. One way Hash functions and DES[C]//CRYPTO 1989:Proceedings of the 1989 Conference on the Theory and Application of Cryptology, LNCS 435. Berlin:Springer-Verlag, 1989:428-446. [25] 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. (MA C S. Low cost RFID authentication protocol with forward privacy[J]. Chinese Journal of Computers, 2011, 34(8):1387-1398.) [26] JUELS A, WEIS S A. Defining strong privacy for RFID[C]//PerCom Workshops' 07:Proceedings of the 2007 IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway, NJ:IEEE, 2007:342-347. [27] OUAFI K, PHAN R C-W. Traceable privacy of recent provably-secure RFID protocols[C]//ACNS 2008:Proceedings of the 2008 International Conference on Applied Cryptography and Network Security, LNCS 5037. Berlin:Springer-Verlag, 2008:479-489. [28] CHATTERJEE S, DAS A K, SING J K. An enhanced access control scheme in wireless sensor networks[J]. Ad Hoc & Sensor Wireless Networks, 2014, 21(1):121-149. [29] AUMASSON J-P, HENZEN L, MEIER W, et al. QUARK:a lightweight hash[C]//CHES 2010:Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems, LNCS 6225. Berlin:Springer-Verlag, 2010:313-339. |