期刊文献+

一种新的所有权可转移的RFID认证协议

Novel RFID authentication protocol with ownership transfer property
下载PDF
导出
摘要 标签在其生命周期内的所有权可转移是某些RFID应用的重要特点。在所有权转移的之后,应该保证新旧所有者不能利用自己掌握的当前或过往信息对另一方进行跟踪或者获得对方的秘密信息。提出了一种新的所有权可转移的RFID认证协议,仅需三步即可实现标签所有权的全部转移。还对新方案的安全性进行了严格的形式化证明。 RFID tags ownership transferring is an important property in some applications during the life period. After this process, all the old or new owners are not allowed to trace or obtain the secret information by using the present or old messages. This paper proposes a novel RFID authentication protocol with ownership transfer property with three steps. A formal proof for the security of the new scheme is also given.
作者 张龙翔
出处 《计算机工程与应用》 CSCD 2012年第18期95-97,118,共4页 Computer Engineering and Applications
关键词 射频识别(RFID)系统 认证协议 所有权转移 随机预言 Radio Frequency Identification (RFID) system authentication protocol ownership transference random oracle
  • 相关文献

参考文献9

  • 1Shamir A.SQUASH--a new MAC with provable security properties for highly constrained devices such as RFID tags[C]//FSE 2008,2008 : 144-157.
  • 2Juels A.Minimalist cryptography for low-cost RFID tags[C]// LNCS 3352:Proc 4th Int Conf Security Commun Netw. Blundo C, Cimato S.New York: Springer-Verlag, 2004: 149-164.
  • 3王春华,许静,彭关超,李湛.改进的RFID标签识别防冲突算法[J].计算机工程与应用,2011,47(31):104-107. 被引量:10
  • 4王立斌,马昌社,王涛.一种安全高效的RFID双边认证协议[J].计算机应用,2008,28(9):2236-2238. 被引量:9
  • 5马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. 被引量:66
  • 6Osaka K, Takagi T,Yamazaki K, et al.An efficient and secure RFID security method with ownership transfer[C]// International Conference on Computational Intelligence and Security.Piscataway,NJ: IEEE Press,2006:1090-1095.
  • 7Jappinen P,Hamalainen H.Enhanced RFID security meth- od with ownership transfer[C]//Intemational Conference on Computational Intelligence and Security.Piscataway, NJ: IEEE Press, 2008: 382-385.
  • 8Lei Hong, Cao Tianjie.RFID protocol enabling ownership transfer to protect against traceability and DoS attacks[C]// The First International Symposium on Data,Privacy,and E-Commerce.Washington DC: IEEE Computer Society Press, 2007: 508-510.
  • 9Kardas S, Levi A, Murat E.Providing resistance against server information leakage in RFID systems[C]//New Technologies,Mobility and Security 2011.NJ: IEEE Press, 2011 : 1-7.

二级参考文献58

  • 1杜海涛,徐昆良,王威廉.基于返回式二进制树形搜索的反碰撞算法[J].云南大学学报(自然科学版),2006,28(S1):133-136. 被引量:29
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3谢振华,赖声礼,陈鹏.RFID技术和防冲撞算法[J].计算机工程与应用,2007,43(6):223-225. 被引量:30
  • 4姜丽芬,卢桂章,辛运帏.射频识别系统中的防碰撞算法研究[J].计算机工程与应用,2007,43(15):29-32. 被引量:57
  • 5Finkenzeller K.射频识别技术[M].陈大才,译.北京:电子工业出版社,2006:5-169.
  • 6Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 7Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 8Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 9Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 10Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.

共引文献81

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部