计算机科学 ›› 2015, Vol. 42 ›› Issue (2): 95-99.doi: 10.11896/j.issn.1002-137X.2015.02.020
刘亚丽,秦小麟,赵向军,郝国生,董永权
LIU Ya-li, QIN Xiao-lin, ZHAO Xiang-jun, HAO Guo-sheng and DONG Yong-quan
摘要: RFID系统的安全和隐私问题已成为阻碍其进一步扩展的瓶颈。针对低代价标签提出了一种基于签名方案的轻量级RFID认证协议,它利用数字签名技术和RFID认证技术的恰当结合,成功实现了RFID系统的轻量级认证机制。性能评估表明新协议除了具有主要的安全隐私性能属性之外,还能够抵抗多种典型的恶意攻击和威胁,其安全性依赖于在有限域上求解离散对数问题的困难性和伪随机数生成器的安全性。新协议将公钥密码技术中代价较高的运算置于服务器端,确保了标签端运算的轻量性,促进了公钥密码技术在RFID系统中的进一步实施。
[1] Schneider M.Radio frequency identification (RFID) technology and its applications in the commercial construction industry[D].University of Kentucky,2003 [2] Chawla V,Dong-Sam H.An overview of passive RFID[J].Communications Magazine,IEEE,2007,45(9):11-17 [3] Roussos G,Kostakos V.rfid in pervasive computing:State-of-the-art and outlook[J].Pervasive and Mobile Computing,2009,5(1):110-131 [4] Want R.The Magic of RFID[J].Queue,2004,2(7):40-48 [5] Juels A.RFID security and privacy:a research survey[J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394 [6] Hlavácˇ .Known-Plaintext-Only Attack on RSA-CRT withMontgomery Multiplication[C]∥Cryptographic Hardware and Embedded Systems(CHES 2009).Springer,2009:128-140 [7] Nithyanand R.The evolution of cryptographic protocols in electronic passports:Cryptology ePrint archive[R].Report 2009/200 [8] Yanjun Z.Survivable RFID Systems:Issues,Challenges,andTechniques[J].IEEE Transactions on Systems,Man,and Cybernetics,Part C:Applications and Reviews,2010,40(4):406-418 [9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1 Generation-2 RFID specification[J].Comput.Stand.Interfaces.,2009,31(1):88-97 [10] Batina L,Guajardo J,Kerins T,et al.Public-Key Cryptography for RFID-Tags[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops,2007(PerCom Workshops’07).2007:217-222 [11] McLoone M,Robshaw M J B.New Architectures for Low-Cost Public Key Cryptography on RFID Tags[C]∥ IEEE International Symposium on Circuits and Systems,2007(ISCAS 2007).2007:1827-1830 [12] Hoffstein J,Howgrave-Graham N,Pipher J,et al.NTRUSign:Digital Signatures Using the NTRU Lattice[C]∥Joye M,ed.Topics in Cryptology(CT-RSA 2003).Springer Berlin Heidelberg,2003:122-140 [13] Hutter M,Feldhofer M,Plos T.An ECDSA Processor for RFID Authentication[C]∥Yalcin S O,ed.Radio Frequency Identification:Security and Privacy Issues.Springer Berlin Heidelberg,2010:189-202 [14] Calmels B,Canard S,Girault M,et al.Low-Cost Cryptography for Privacy in RFID Systems[C]∥Domingo-Ferrer J,Posegga J,Schreckling D,eds.Smart Card Research and Advanced Applications.Springer Berlin Heidelberg,2006:237-251 [15] Liang Y,Rong C.RFID System Security Using Identity-Based Cryptography[C]∥Presented at the Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing.Oslo,Norway,2008:482-489 [16] Liu Ya-li,Qin Xiao-lin,Li Bo-han.Forward-Secure Blind Signature Schemes Based on the Variants of ElGamal[J].China Communications,2010,7(4):58-64 [17] C Hung-yu.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4 (4):337-340 |
No related articles found! |
|