<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">inf24101</article-id><article-id pub-id-type="doi">10.15388/Informatica.2013.381</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>Authentication Protocols for Reliable Information Provision Systems with Low Computational-Ability Devices</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Ya-Fen</given-names></name><email xlink:href="mailto:cyf@cs.ccu.edu.tw">cyf@cs.ccu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><contrib contrib-type="Author"><name><surname>Tai</surname><given-names>Wei-Liang</given-names></name><email xlink:href="mailto:taiwl@cs.ccu.edu.tw">taiwl@cs.ccu.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_001"/></contrib><contrib contrib-type="Author"><name><surname>Chen</surname><given-names>Chia-Chen</given-names></name><email xlink:href="mailto:tr.emily@gmail.com">tr.emily@gmail.com</email><xref ref-type="aff" rid="j_INFORMATICA_aff_002"/><xref ref-type="corresp" rid="fn1">∗</xref></contrib><aff id="j_INFORMATICA_aff_000">Department of Computer Science and Information Engineering, National Taichung University of Science and Technology, Taichung, Taiwan</aff><aff id="j_INFORMATICA_aff_001">Department of Information Communications, Chinese Culture University, Taipei, Taiwan</aff><aff id="j_INFORMATICA_aff_002">Department of Management Information Systems, National Chung Hsing University, No. 250, Kuo Kuang Rd., Taichung 402, Taiwan</aff></contrib-group><author-notes><corresp id="fn1"><label>∗</label>Corresponding author.</corresp></author-notes><pub-date pub-type="epub"><day>01</day><month>01</month><year>2013</year></pub-date><volume>24</volume><issue>1</issue><fpage>1</fpage><lpage>12</lpage><history><date date-type="received"><day>01</day><month>06</month><year>2011</year></date><date date-type="accepted"><day>01</day><month>07</month><year>2012</year></date></history><abstract><p>Wireless communication techniques provide convenience for users to get desired information. Construction and management costs of information provision systems with low computational-ability devices, such as RFID devices, are low so lightweight authentication protocols are required for information security. In this paper, two lightweight authentication protocols are proposed for reliable information provision systems with low computational-ability devices. The first protocol is for public information, and the other ensures that only authorized users can get information.</p></abstract><kwd-group><label>Keywords</label><kwd>RFID</kwd><kwd>the LPN problem</kwd><kwd>wireless communications</kwd><kwd>NP-completeness</kwd></kwd-group></article-meta></front></article>