期刊文献+

Molnar协议的安全性证明

Security proof of Molnar protocol
下载PDF
导出
摘要 Molnar协议是射频识别(RFID)系统中读写器与标签之间的双边认证协议,同时强调能够保护标签的位置隐私,而协议安全性尚未得到形式化的分析和证明。在eHa模型下,严格地证明了Molnar协议具有不可预测的强隐私性,并得到确切的安全界。协议的证明使用了基于Game的方法,将协议的隐私性紧致地归约到伪随机函数的输出与随机函数的输出多项式时间不可区分的假设上,对分析和解决RFID系统安全性问题有效而通用。 Molnar protocol is a scheme for mutual authentication between tags and readers in Radio Frequency Identification (RFID) system, which emphasizes protecting privacy for the tag; however, its security has not been proved formally. By using the ella model, a formal proof was given, in which the output of the Molnar protocol maintain unpredictable, denoted as un-privacy. Moreover, the accurate security boundary of the Molnar protocol was computed. The privacy of protocol was reduced tightly on the assumption that the output of pseudorandom functions was indistinguishable from the output of random functions in polynomial time by utilizing the game-based technique. This technique is a powerful tool for analyzing and solving the privacy problem of RFID system, and provides an effective and universal solution.
出处 《计算机应用》 CSCD 北大核心 2011年第3期798-800,804,共4页 journal of Computer Applications
关键词 射频识别 安全模型 强隐私性 可证明安全 Radio Frequency Identification (RFID) security model strong privacy provable security
  • 相关文献

参考文献13

  • 1MOLNAR D, WAGNER D. Privacy and security in library RFID, issues, practices and architectures [ C]// ACM Conference on Com- munications and Computer Security. New York: ACM Press, 2004: 210 -219.
  • 2PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIA- DOR J M, et al. RFID systems: A survey on security threats and proposed solutions [ C]//PWC'06: Proceedings of the 11 th IFIP In- ternational Conference on Personal Wireless Communications, LNCS 4217. Berlin: Springer, 2006:159-170.
  • 3MA CHANGSHE, LI YINGJIU, DENG R H. RFID privacy: Rela- tion between two notions, minimal condition and efficient construction [C]// Proceedings of the 16th ACM Conference on Computer and Communications Security. New York: ACM Press, 2009:54 -65.
  • 4BRESSON E, CHEVASSUT O, POINTCHEVAL D. New security results on encrypted key exchange [ C]//PKC 2004: Proceedings of the 7th International Workshop on Theory and Practice in Public Key Cryptography. Berlin: Springer, 2004: 145- 148.
  • 5BRESSON E, CHEVASSUT O, POINTCHEVAL D. Security proofs for an efficient password-based key exchange [ C]// Proceedings of ACM Computer and Communications Security. New York: ACM Press, 2003:241-250.
  • 6姜丽芬,李章林,辛运帏.一种实用的轻量级RFID安全协议研究[J].计算机科学,2009,36(6):105-107. 被引量:5
  • 7GARFINKEL S L, JUELS A, PAPPU R. RFID privacy: An over-view of problems and proposed solutions [ J]. IEEE Security and Pri- vacy, 2005, 3(3): 34-43.
  • 8JUELS A, WEISS A. Define strong privacy for privacy for RFID [ C]// Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops. Washington, DC: IEEE Computer Society, 2007:342-347.
  • 9RHEE K, KWAK J, KIM S, et al. Challenge-response based RFID authentication protocol for distributed database environment [ C]// SPC 2005: Proceedings of the Second International Conference on Security in Pervasive Computing, LNCS 3450. Berlin: Springer, 2005:70 - 84.
  • 10HA J H, MOON S J, ZHOU J Y, et al. A new formal proof model for RFID location privacy [ C]// ESORICS'08: Proceedings of the 13th European Symposium on Research in Computer Security, LNCS 5283. Berlin: Springer, 2008:267-281.

二级参考文献12

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2中华人民共和国科学技术部等十五部委.中国射频识别(RFID)技术政策白皮书.2006-06-09[OL].http://www.eetchina.com/ARTICLES/2006JUN/PDF/CHINARFIDWHITEPAPERPDF
  • 3Feldhofer M, Dominikus S, Wolkerstorfer J. Strong Authentication for RFID Systems Using the AES Algorithm[C]//Cryptographic Hardware and Embedded Systems- CHES 2004-6th Int' l Workshop, LNCS 3156. Springer, 2004: 357-370
  • 4Sarma S E, Weis S A, Engels D W. Radio-frequency-identification security risks and challenges[J].CryptoBytes, 2003, 6 (1)[OL]. http:// www. rsasecufity.com/rsalabs/cryptobytes/CryptoBytes_Mareh_2003_lowres. pdfJHJsearch = % 22Radiofrequency-identification% 20security% 20risks% 20and% 20challenges%22
  • 5Juels A, Pappu R. Squealing Euros:Privacy protection in RFIDenabled banknotes[C] //R. Wright, ed. Fmancial Cryptography ' 03, volume 2742 of Lecture Notes in Computer Science. Springer-Verlag, 2003: 103-121
  • 6Sarma W S,Rivest R,Engels D. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[C]//1st Intern. Conference on Security in Pervasive Computing (SPC). 2003: 454-469
  • 7Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-friendly Tags[C] // RFID Privacy Workshop. MIT, 2003
  • 8Avoine G , Oechslin P. A Scalable and Provably Secure Hash Based RFID Protocol [C]//the 2nd IEEE International Workshop on Pervasive Computing and Communication Security (PerSec), 2005 [OL]. http:// lasecwww. epfl. ch/puh/lasec/ doc/AO05. pdfJHJsearch =% 22filetype% 3Apdf% 20A% 20Scalahle% 20and% 20Provably% 20Secure% 20Hash% 20Based% 20RFID% 20Protocol% 22
  • 9Dimitriou T. A Lightweight RFID protocol to protect against Traceability and Cloning attacks[C]// IEEE International Conference on Security and Privacy for Emerging Areas in Communication Networks,SECURECX)MM Z005[OL]. http: ffwww. air. edu. gr/faculty/T_Dimitriou_files/RFID-secureeomm05, pdfJHJsearch =% 22filetype% 3Apdf% 20A% 201Lightweight% 20RFID% 20protocol% 20to% 20protect% 20against% 20Traceability% 20and% 20Cloning%20attaeks % 22
  • 10Juels A. Minimalist Cryptography for Low-Cost RFID Tags[C] //Security in Communication Networks-Proc. 4th Int'l Conf. , LNCS 3352. Springer, 2004 :149-164[OL]. http://www.rsasecurity.com/rsalabs/nod. asp? id=2033

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部