期刊文献+

基于秘密共享方案RFID认证协议 被引量:1

RFID authentication protocol based on secret-sharing scheme
下载PDF
导出
摘要 标签的认证效率一直以来都是影响无线射频识别(RFID)技术广泛应用的一个重要因素,但是目前还没有一个较好的解决方法。在基于树的RFID协议的基础上,通过秘密共享方案将各边的共享密钥分成多份,在保持查找效率的条件下构建了新的密钥树,并设计了基于共享密钥的认证协议。通过分析表明,协议保证较高的认证效率,同时还具有足够的安全性,而且解决了RFID系统研究中长期困扰的密钥更新问题。 The authentication efficiency of tags is always an important factor that restricts the extensive application of Radio Frequency IDentification(RFID).But there is not a good method to solve the problem till now.On the basis of tree-based RFID protocol,this article shared the secret of each path with many portions using the secret-sharing scheme.A new secret tree was created and a secret-sharing-based protocol was proposed while still keeping the searching efficiency.After being analyzed,the protocol is proved to be secure and efficient,and it also solves the key-updating problem which has slowed the study of RFID system for a long time.
作者 杨超 张红旗
出处 《计算机应用》 CSCD 北大核心 2012年第12期3458-3461,共4页 journal of Computer Applications
关键词 认证效率 射频识别系统 秘密共享方案 密钥树 authentication efficiency Radio Frequency IDentification(RFID) system secret-sharing scheme secret-tree
  • 相关文献

参考文献12

  • 1马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. 被引量:66
  • 2LEE S M, HWANG Y J, LEE D H, et al. Efficient authentication for low-cost RFID systems [ C ]// Proceedings of the International Conference on Computational Science and Its Applications. Berlin: Springer-Verlag, 2005:619-627.
  • 3DIMITRIOU T. A lightweight RFID protocol to protect against trace- ability and cloning attacks [ C ]// Proceedings of 1 st International Conference on Security and Privacy for Emerging Areas in Communi- cation Networks. Washington, DC: IEEE Computer Society, 2005:.59 - 66.
  • 4HENRICI D, MILLER P. Hash-based enhancement of location pri- vacy for radio-frequency identification devices using varying identi- fiers[ C]// Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops. Washington, DC: IEEE Computer Society, 2004:149 - 153.
  • 5邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26. 被引量:22
  • 6MOLNAR D, SOPPERA A, WAGNER D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags[ C]// Proceedings of the Selected Areas in Cryptography. Berlin: Springer- Verlag, 2005 : 276 - 290.
  • 7DIMITRIOU T. A secure and efficient RFID protocol that could make big brother (partially) obsolete[ C]// Proceedings of the Fourth Annual IEEE International Conference on Pervasive Compu- ting and Communications. Washington, DC: IEEE Computer Socie- ty, 2006:269 - 275.
  • 8LULI, HAN JINSONG, HU LEI, et al. Dynamic key-updating: privacy-preserving authentication for RFID systems C]// Proceed- ings of the 5th IEEE International Conference on Pervasive Compu- ting and Communications. Piscataway: IEEE, 2007:13 -22.
  • 9BUT'IAN L, HOLCZER T, VAJDA I. Optimal key-trees for tree- based private authentication[ C]//Proceedings of Workshop on Pri- vacy Enhancing Technologies. Berlin: Springer-Vedag, 2006:332 -350.
  • 10SHAMIR A. How to share a secret[ J]. Communications of the ACM, 1979, 22(11): 612-613.

二级参考文献40

  • 1鞠伟成,俞承芳.一种基于动态二进制的RFID抗冲突算法[J].复旦学报(自然科学版),2005,44(1):46-50. 被引量:42
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 3Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 4Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 5Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 6Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 7Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 8Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 9Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.
  • 10Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65.

共引文献99

同被引文献11

  • 1JUELS A. RFID security and privacy: A research survey[ J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) : 381 - 394.
  • 2SARMA S E, WEI S A, ENGELS D W. Radio frequency identifica- tion: Secure risks and challenges [ J]. RSA Laboratories Crypto bytes, 2003, 6(1):2-9.
  • 3WEI S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [ C]//Se- curity in Pervasive Computing, LNCS 2802. Heidelberg: Springer Berlin, 2004:201 -212.
  • 4OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward- secure privacy protection scheme for low-cost RFID [ C]//Proceed- ings of the 2004 Symposium on Cryptography and Information Securi- ty. Berlin: Springer-Verlag, 2004:719-724.
  • 5ZHANG Y, GUO H. An improved RFID privacy protection scheme based on Hash-chain [ C]// Proceedings of the 2010 International Conference on Logistics Engineering and Intelligent Transportation Systems. New York: IEEE Press, 2010:1 -4.
  • 6DIMITRIOU T. A lightweight RFID protocol to protect against traceability and cloning attacks [ C ]// Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks. Washington, DC: IEEE Computer Society, 2005:59 -66.
  • 7李章林,卢桂章,辛运帏.基于Hash链的可扩展RFID验证协议[J].计算机工程,2008,34(4):173-175. 被引量:7
  • 8钟杰卓.基于Hash链的RFID安全协议研究与设计[J].现代计算机,2010,16(8):139-141. 被引量:3
  • 9熊宛星,薛开平,洪佩琳,麻常莎.基于二维区间Hash链的RFID安全协议[J].中国科学技术大学学报,2011,41(7):594-598. 被引量:4
  • 10张顺,陈海进.轻量级的无线射频识别安全认证协议[J].计算机应用,2012,32(7):2010-2014. 被引量:5

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部