Research Article
The Lightweight RFID Grouping-Proof Protocols with Identity Authentication and Forward Security
Table 1
The symbols used in our protocols.
| Symbols | Description |
| gid | The identifier of a tag group | , | The current and last round secret key of the tag | , | The current and last round identifier of the tag | rk, rid | The secret key and identifier of the trusted reader | hash() | A secure hash function | prng() | A pseudorandom number generator | rv, rr, rti | Some pseudorandom numbers generated by the different entities | t | The timestamp of the verifier | d | The bit number of the secret key and the identifier | ā | Bitwise XOR operation |
|
|