期刊文献+

代理计算签名及其在RFID认证中的应用 被引量:1

Computing-Commission Signature and its Application in RFID Authentication
下载PDF
导出
摘要 射频识别(RFID)是物联网中实现物品标识的一项关键技术,但RFID标签的计算能力十分有限,导致传统的公钥密码技术很难有效地应用到RFID认证技术中,限制了RFID的应用范围和提供服务的形式。针对读卡器和标签计算资源不对称的特点,提出一种新的签名算法——代理计算签名,将传统的签名技术中耗能的复杂运算交给读卡器(验证方)来完成,从而实现标签对消息的签名,并仍能保持签名的安全性,解决了RFID标签很难计算数字签名的困难问题。结合Rabin型数字签名和加密算法,进一步地给出了基于代理计算签名的RFID认证方案,实现了标签与读卡器间的双向认证,大大地降低了标签的实现成本。 RF1D is one of the key technologies for items identification in Inlernet of things, while the limited eomputing ability of RFID lags make it difficuh to apply traditional public key ryplography to RFID authentication efficiently, which greatly limits the scope of RFID applications and the forms of providing services. A new signature algorithm called computingcommission signature algorithm is presented aim at the character that the computing resources of ,eaders and RFID tags are asymmetric. In our signature algorithm, we leaved the complex energy-consuming computation in traditional signature algorithm to the verifier (readers) so that the signature can he generated on tags and the security of the signature is still satisfied. Our signature algorithm solved the difficuh problem of computing digital signature in RFID tags. Combining with Rahin-type signature and eneryption algorithm, a RFID authentication scheme based on computing-commission signature is further proposed, which achieved mutual authentication between readers and tags. It greatly reduced the implementation cost of tags.
出处 《电子产品可靠性与环境试验》 2015年第1期24-28,共5页 Electronic Product Reliability and Environmental Testing
关键词 射频识别 代理计算 签名 认证 Radio Frequency Identification (RFID) computing-commission signature Au-thentication
  • 相关文献

参考文献6

  • 1AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. Wireless sensor networks: a survey [J] . Computer Networks, 2002, 38: 393-422.
  • 2陈积明,林瑞仲,孙优贤.无线传感器网络的信息处理研究[J].仪器仪表学报,2006,27(9):1107-1111. 被引量:53
  • 3HANKERSON D, MENEZES A, VANSTON S. 椭圆曲线密码学导论[M].张焕国,译.北京:电子工业出版社,2005.
  • 4MILLER. V. Use of elliptic curves in cryptography [C] // Advances in Cryptology-Proceedings of CRYPTO' 85. 1986 : 417-426.
  • 5KOBLITZ N. Elliptic curve cryptosystems [J] . Math.Comp., 1987, 48 (5): 203-209.
  • 6RABIN M O. Digitalized signatures and public-key func- tions as intractable as factorization [R] . MIT/LCS/TR-212, MIT Laboratory for Computer Science, 1979.

二级参考文献8

  • 1AKYILDIZ L F, SU W L, SANKARASUBRAMA-NIAM Y, et al. Wireless sensor networks: A survey[J]. Computer Networks, 2002, 38:393-422.
  • 2STANKOVIC J A, ABDELZAHER F, LU C Y, et al. Real-Time communication and coordination in embedded sensor networks[J]. Proceedings of the IEEE,2003, 91(7):1002- 1022.
  • 3LIU C L, LAYLAND J W. Scheduling algorithm for multiprogramming in a hard real-time environment[J]. 1973, 20(1):46-61.
  • 4BERNAT G, BURNS A, ALBERT L. Weakly hard real-time systems[J]. IEEE Transaction on Computers, 2001, 50(4) :308-321.
  • 5CHEN J M, SONG Y Q, WANG Z, et al. Extended DBP for (m,k)-Firm based QoS[J]. Lecture Notes in Computer Science, 2004,3222:357-365.
  • 6HAMDAOUI M, RAMANATHAN P. A dynamic priority assignment technique for streams with (m, k)-Firm deadlines[J]. IEEE Transaction on Computers,1997, 46(12) :1325-1337.
  • 7任丰原,黄海宁,林闯.无线传感器网络[J].软件学报,2003,14(7):1282-1291. 被引量:1709
  • 8马祖长,孙怡宁,梅涛.无线传感器网络综述[J].通信学报,2004,25(4):114-124. 被引量:463

共引文献63

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部