期刊文献+

基于超椭圆曲线密码体制的RFID安全协议 被引量:2

RFID security protocol based on hyperelliptic curve cryptosystem
下载PDF
导出
摘要 为了解决RFID系统的安全和成本问题,提出了一种基于超椭圆曲线密码体制的RFID安全协议。利用新的签密算法,在RFID阅读器和电子标签之间实现了信息的加密和认证。与现有的签密算法比较,该协议具有前向安全和可公开验证,能避免恶意信息的攻击。协议的安全性和性能分析结果表明,该协议达到了RFID系统高隐私安全和低标签成本的结合。 To solve cost and security problems of RFID system,an RFID security protocol based on hyperelliptic curve cryptosystem is proposed.The protocol realizes encryption and certification of data between RFID tag and reader by using new signcryption.The new protocol has the capability of forward secrecy and public verifiability and avoids the attack of evil information compared with the exsiting signcryption.The security and performance of the protocol is analyzed,results prove that the new protocol achieves the integration of low tag cost and high security of RFID system.
作者 冯君 汪学明
出处 《计算机工程与设计》 CSCD 北大核心 2013年第10期3427-3430,3679,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(61163049) 贵州大学研究生创新基金项目(理工2012034)
关键词 签密 RFID安全协议 超椭圆曲线密码体制 前向安全 公开验证 signcryption RFID security protocol hyperelliptic curve cryptosystem forward secrecy public verifiability
  • 相关文献

参考文献4

二级参考文献84

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2彭长根,李祥,罗文俊.一种面向群组通信的通用门限签密方案[J].电子学报,2007,35(1):64-67. 被引量:14
  • 3ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms.IEEE Transactions on Information Theory,1985,31(4):469-472.
  • 4Miller V S.Uses of elliptic curves in cryptography.Advances in Cryptology:Proceedings of the 5th Annual International Cryptology Conference (Crypto'85),Aug 18-22,1985,Santa Barbara,CA,USA.LNCS 218.Berlin,Germany:Springer-Verlag,1986:218:417-426.
  • 5Koblitz N.Elliptic curve cryptosystems.Mathematics of Computation,1987,48(177):203-209.
  • 6Johnson D,Menezes A,Vanstone S.The elliptic curve digital signature algorithm (ECDSA).International Journal on Information Security,2001,1(1):36-63.
  • 7Zhang Y L,Imai H.How to construct efficient signcryption schemes on elliptic curves.Information Processing Letters,1998,68(5):227-233.
  • 8Caelli W J,Dawson E P,Rea S A.PKI,elliptic curve cryptography,and digital signature.Computer & Security,1999,18(1):47-66.
  • 9Liao H Z,Shen Y Y.On the elliptic curve digital signature algorithm.Tunghai Science,2006,9(8):109-126.
  • 10Koblitz N.A family of Jacobians suitable for discrete log cryptosystems.Advances in Cryptology:Proceedings of the 8th Annual International Cryptology Conference (Crypto'88),Aug 21-25,1988,Santa Barbara,CA,USA.LNCS 403.Berlin,Germany:Springer-Verlag,1989:94-99.

共引文献85

同被引文献21

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部