Research Article

The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security

Table 1

The symbols used in our protocols.

SymbolsDescription

gidThe identifier of a tag group
, The current and last round secret key of the tag
, The current and last round identifier of the tag
rk, ridThe secret key and identifier of the trusted reader
hash()A secure hash function
prng()A pseudorandom number generator
rv, rr, rtiSome pseudorandom numbers generated by the different entities
tThe timestamp of the verifier
dThe bit number of the secret key and the identifier
āŠ•Bitwise XOR operation