期刊文献+

置换再交叉运算的所有权转移协议

OWNERSHIP TRANSFER PROTOCOL ON REP-REC
下载PDF
导出
摘要 针对标签生命周期中归属权转变过程中存在的隐私信息易泄露问题,设计一种基于置换再交叉运算的所有权转移协议。协议为保证隐私信息的安全性,采用基于大数分解难题的二次剩余定理对部分信息加密;同时协议为保证尽可能降低系统的计算量,引入基于位运算的置换再交叉运算对部分信息加密。为抵抗常见类型攻击方式,协议采用先认证再操作的机制。将该协议与其他协议进行安全性和性能分析,该协议具备安全性高、计算量小等优势。 In order to solve the problem that privacy information is easy to leak in the process of ownership transformation in the label life cycle,a ownership transfer protocol based on Rep-Rec is designed.In order to ensure the security of privacy information,the protocol encrypted the partial information by using the quadratic residual theorem based on the big number decomposition problem.At the same time,in order to reduce the calculation of the system as much as possible,the protocol introduced the replacement and cross operation based on bit operation to encrypt partial information.In order to resist common types of attacks,the protocol adopted the mechanism of authentication before operation.This paper analyzed the security and performance of this protocol and other protocols.This protocol has the advantages of high security and small computation.
作者 刘宗妹 徐金成 Liu Zongmei;Xu Jincheng(Department of Information Management,Guangdong Justice Police Vocational College,Guangzhou 510520,Guangdong,China)
出处 《计算机应用与软件》 北大核心 2021年第9期338-342,349,共6页 Computer Applications and Software
基金 广东省科技厅社会发展科技协同创新体系建设-基于大数据的服刑人员再犯罪风险评估研究(2019B020208001)。
关键词 物联网 射频识别技术 置换再交叉运算 转移协议 二次剩余定理 所有权 Internet of things RFID technology Rep-Rec Transfer protocol Secondary residual theorem Ownership
  • 相关文献

参考文献9

二级参考文献37

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:210
  • 2Molnar D,Soppera A, Wagner D. A Scalable, Delegatable Pseu donym Protocol Enabling Ownership Transfer of RHD Tags [C]// Proc. of SAC'05. Kingston,Jamaica: Springer-Verlag, 2005 : 276- 290.
  • 3Osaka K,Takagi T, Yamazaki K, et al. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of CIS' 06. Springer-Verlag, 2006 : 778-787.
  • 4Fouladgar S, Afifi H. An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[C]//Proc. of the 1st Inter- national Workshop on RFID Technology. Vienna, Austria, 2007.
  • 5Kulseng L, Yu Zhen,Wei Ya-wen, et ak Lightweight mutual au- thentication and ownership transfer for RFID systems [C]// Proc of the 29th Conf on Computer Communications IEEE IN- FOCOM 2010. Piscataway, NJ : IEEE, 2010 : 1-5.
  • 6Fernandez-Mir A, Trujillo-Rasua R, Castella-Roca J, et al. A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation. RFID, Security and Priva- cy, LNCS, 2012,7055 : 147-162.
  • 7Doss R, Zhou Wan-lei, Yu Shui. Secure RFID Tag Ownership Transfer Based on Quadratic Residues[J]. IEEE Transcations on information forensics and security,2013,8(2),390-401.
  • 8Shamir A. SQUASH-A new MAC with provable security prop- erties for constrained devices such as RFID tags [C]~//LNCS 5086 : Proc of 15th Annual Fast Software Encryption Workshop. Springer, 2008 : 144-157.
  • 9丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592. 被引量:93
  • 10邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145. 被引量:12

共引文献85

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部