期刊文献+

一种基于NTRU公钥加密系统的RFID认证协议 被引量:11

AN NTRU PUBLIC KEY ENCRYPTION SYSTEM BASED RFID AUTHENTICATION PROTOCOL
在线阅读 下载PDF
导出
摘要 随着RFID(Radio Frequency Identification)技术研究进展,RFID系统的应用日趋广泛,从而使得RFID系统本身固有限制所导致的一些问题变得突出和严重,其中就包括RFID的安全、隐私问题。所以基于RFID系统的发展和应用考虑,RFID系统必须满足一定的安全需求。在NTRU(Number Theory Research Unit)公钥加密系统的基础上,提出一种新的RFID安全认证协议,并且结合NTRU公钥加密系统的安全性和通用可组合模型,对新协议的安全性进行了系统、形式化的描述和分析。 With RFID technology research development,RFID system applications are becoming increasingly popular.Hence some problems,which are caused by RFID system's intrinsic restrictions,such as RFID security and privacy issues,become prominent and significant.Therefore,considering about the development of RFID systems and applications,the RFID systems must satisfy certain safety requirements.On the basis of NTRU public key encryption system,a new RFID security authentication protocol is proposed.In addition,by combining NTRU public key encryption system security and general compositional model,there are systematic and formal description and analysis on the safety of the new protocol.
作者 李斌 凌力
出处 《计算机应用与软件》 CSCD 北大核心 2012年第4期278-280,288,共4页 Computer Applications and Software
关键词 射频识别技术 认证协议 NTRU RFID Authentication protocol NTRU(Number Theory Research Unit)
  • 相关文献

参考文献5

  • 1张帆,孙璇,马建峰,曹春杰,朱建明.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767. 被引量:30
  • 2Kaya S V,Sava E. Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks Journal,2009,(01):136-152.
  • 3Paise R I,Vaudenay S. Mutual authentication in RFID:Security and privacy[A].Tokyo,Japan.ACM Press,2008.292-299.
  • 4Gaubatz G,Kaps J P,Ozturk E. State of the art in ultra-low power public key coptography for wireless sensor networks[A].Kauai Island,Hawaii.IEEE Press,2005.146-150.
  • 5Hoffstein J,Pipher J,Silverman J H. NTRU:A ring-based public key crypto-system[A].1998.267-288.

二级参考文献38

  • 1Sarma S, Weis S, Engels D. White paper: RFID systems, security and privacy implications. Auto-ID Center, MIT:Technical Report MIT-AUTOID-WH-014, 2002
  • 2Juels A, Weis S A. Defining strong privacy for rfid//Proceedings of the 5th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'07). Washington, DC, USA, 2007:342-347
  • 3Burmester M, Le T, Medeiros B. Provably secure ubiquitous systems: Universally composable RFID authentication protocols//Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Maryland, USA, 2006:1-9
  • 4Li Y, Ding X. Protecting rfid communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security ( ASIACCS' 07). Singapore, 2007:234-241
  • 5Sarma S, Weis S, Engels D. Radio-frequency identification systems//Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems. San Francisco, USA, 2002:454 -469
  • 6Juels A. RFID security and privacy: A research survey. Journal of Selected Areas in Communication (J-SAC), 2006, 24(2) : 381-395
  • 7Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy//Proceedings of the 8th ACM Conference on Computer and Communications Security(CCS). Washington DC, USA, 2003:103-111
  • 8Weis S A, Sarma S E, Rivest R L, Engels D W. Security and privacy aspects of low-cost radio frequency identification systems//Proceedings of the International Conference on Security in Pervasive Computing--SPC 2003, Lecture Notes in Computer Science 2802. Boppard, Germany, Springer-Verlag, 2003:201-212
  • 9Ohkubo M, Suzuki K, Kinoshita S. Efficient hash-chain based RFID privacy protection scheme//Proceedings of the International Conference on Ubiquitous Computing--Ubicomp, Workshop Privacy: Current Status and Future Directions. Nottingham, England, Springer-Verlag, 2004
  • 10Tsudik G. YA-TRAP: Yet another trivial RFID authentication protoeol//Proceedings of the International Conference on Pervasive Computing and Communications-- PerCom 2006. Pisa, Italy, 2006:640-643

共引文献29

同被引文献73

  • 1曹珍富.密码学的新发展[J].四川大学学报(工程科学版),2015,47(1):1-12. 被引量:27
  • 2徐小双,关治洪.基于混沌映射的交互式零知识证明身份认证协议[J].计算机工程与应用,2005,41(4):156-157. 被引量:2
  • 3周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:215
  • 4Kaya S V, Sava E.Public key cryptography based privacy preserving multi-context RFID infrastructure[J].Ad Hoc Networks, 2009,7 ( 1 ) : 136-152.
  • 5Gaubatz G,Kaps J EState of the art in ultra-low power public key cryptography for wireless sensor networks[C]// Proceedings of the 3rd IEEE International Workshop on Pervasive Computing and Communication Security-PerSec 2005.Washington DC, USA: IEEE Press, 2005 : 146-150.
  • 6Paise R l,Vaudenay S.Mutual authentication in RFID: security and privacy[C]//Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security 2008.Tokyo, Japan: ACM Press, 2008 : 292-299.
  • 7Ranasinghe D C,Engels D W,Cole P H.Low-cost RFID systems: confronting security and privacy[C]//Auto-ID Labs Research Workshop, University of Adelaide, Zurich, Swit- zerland, 2005 : 1-14.
  • 8Avoine G,Lauradoux C,Martin T.When compromised Readers meet RFID[C]//10th International Workshop, WlSA 2009,2009,5932 : 35-50.
  • 9Atici A C,Fan Junfeng,Batina L,et al.Low-cost imple- mentations of NTRU for pervasive security[C]//Proceed- ings IEEE 19th International Conference on Application- Specific Systems, Architectures and Processors.Leuven, Belgium : IEEE Press, 2008 : 79-84.
  • 10Hoffstein J,Pipher J, Silverman J H.NTRU: a ring-base public key cryptosystem[C]//Buhler J P.Lecture Notes in Computer Science: Algorithmic Number Theory (ANTS III). Berlin: Springer-Verlag, 1998,1423 : 267-288.

引证文献11

二级引证文献28

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部