期刊文献+

基于NTRU公钥密码系统的RFID通信安全协议的研究 被引量:7

RFID Communication Security Protocol Based on NTRU Public Key Cryptosystem
下载PDF
导出
摘要 提出使用NTRU公钥密码系统建立RFID通信安全协议。通过使用构造随机化函数对NTRU公钥密码系统的明文进行动态、随机化映射,使由其映射后的明文具有了动态、随机分布的特性,实现了对明文信息的隐蔽,抵御了对明文信息特性的统计,致使攻击者对所得信息及信息来源无法区分和识别。由此设计的安全协议不仅满足了RFID通信安全协议要求的保密性、认证性等基本功能,而且能够有效地解决流量分析、跟踪攻击、隐私泄漏等RFID系统特殊的安全问题。同时不需要穷尽搜索,不需要密钥同步,密钥存储、密钥管理系统简单,并且具有良好的可扩展性。 RFID communication security protocol based on NTRU public key cryptography system is established. The plaintexts are randomly mapped by structuring the randomization function, and then the plaintexts mapped possess the properties of dynamic and random distribution. As a result, the plaintext characteristics can be hidden and can't be taken statistics. And that attackers are unable to distinguish from the messages and the message sources. RFID communication security protocol established by the method is not only able to meet the basic confidentiality and authentication requirements, but also effectively solve the special security issues of RFID communication such as traffic analysis, tracking attack, privacy leakage and so on; Moreover, the method has the following advantages: without key synchronization and exhaustive search of ID or key, with simple key storage and key management system, and a good scalability.
出处 《中山大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第5期6-11,共6页 Acta Scientiarum Naturalium Universitatis Sunyatseni
基金 国家"985"工程二期资助项目(90013-3272240) 广东省自然科学基金资助项目(06023131)
关键词 RFID系统 安全协议 NTRU公钥密码系统 认证协议 RFID system security protocol NTRU public key cryptosystem authentication protocol
  • 相关文献

参考文献8

  • 1EPCglobal tag data standards version 1.3 [ S ]. http:// www. epcglobalinc, org.
  • 2SARMA S E, WEISS A, ENGELS D W. Radio-frequency identification : secure risks and challenges [ J ]. RSA Laboratories Cryptophytes, 2003, 6 ( 1 ) : 2 - 9.
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 4RHEE K, KWAK J, KIM S. Challenge-response based RFID authentication protocol for distributed database environment [ J ]. Lectures Notes in Computer Science 3450, Berlin : Springer-Verlag, 2005 : 78 - 84.
  • 5MARTIN F, SANDRA D, JOHANNES W S. Strong au-thentication for RFID systems using the AES algorithm [ J ]. International Associations for Cryptology Research 2004, CHES 2004, LNCS 3156, 2004:357-370.
  • 6MAO W B. Modem cryptography: theory and practice [M].北京:电子工业出版社,2004:165-190.
  • 7HOFFSTEIN J, PIPHER J, SILVERMAN J H. NTRU: A ring-based public key crypto - system [ C ]. In Proc of ANTS-III, LNCS 1423, 1998:267 -288.
  • 8The NTRU public key cryptosystem-a tutorial [ J]. http ://www. ntru. com.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献209

同被引文献64

  • 1王海艳,黄海平,王汝传,李明远.基于主从代理协作的多重数字签名机制的研究[J].计算机科学,2005,32(5):85-88. 被引量:1
  • 2张文芳,何大可,缪祥华,王小敏.基于NTRU公钥密码体制的无线局域网安全方案[J].计算机应用研究,2006,23(1):111-113. 被引量:4
  • 3王海艳,王汝传.基于密钥分割的多移动代理系统安全性研究[J].电子与信息学报,2006,28(3):546-550. 被引量:2
  • 4周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 5张文芳,余位驰,何大可,王小敏.一种基于格理论的数字签名方案[J].计算机科学,2006,33(3):93-96. 被引量:4
  • 6Wang Ching-Te,Chang Chin-Chen,Lin Chu-Hsing.Generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences,2000,E83-A(6):1228-1237.
  • 7Tseng Yuh-Min,Jan Jinn-Ke,Chien Hung-Yu.On the security of generalization of threshold signature and authenticated en cryption for group communication[J].IEICE Transactions on Fundamentals,2001,E84-A(10):2606-2609.
  • 8Hsu Chien-Lung,Wu Tzong-Sun,Wu Tzong-Chen.Improve ments of generalization of threshold signature and authenticated encryption for group communication[J].Information Processing Letter,2002,81(1):41-45.
  • 9Wang Shuhong,Wang Guilin,Bao Feng,et al.Security notes on generalization of threshold signature and authenticated encryption for group communication[J].IEICE Transactions on Fundamentals,2004,E87-A(12):3443-3446.
  • 10Neal Koblitz,Alfred Menezes,Scott Vanstone.The state of elliptic curve cryptography[J].Designs,Codes,and Cryptography,2000,19(2-3):173-193.

引证文献7

二级引证文献25

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部