Anonymous untraceable RFID mutual authentication method

A technology of mutual authentication and multiplication group, applied in the field of RFID mutual authentication technology, can solve problems such as unspecified implementation methods, inconformity with the low-cost requirements of RFID tags, and high cost

Inactive Publication Date: 2015-02-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are some anonymous authentication protocols, but they all have certain security performance and other problems.
In 2006, Heydt designed an anonymous payment system for bus tickets based on anonymous certificates, but the scheme did not give the specific implementation method of the system
In 2009, Bichsel proposed a method of implementing anonymous certificates based on Java Cards, but all devices need to implement public key cryptographic algorithms, which does not meet the low-cost requirements of RFID tags.
In 2009, Blass gave an applicable anonymous payment scheme based on RFID, but the scheme requires the number of tags in the system to be fixed, which makes the scheme not very scalable
In 2010, Armknecht et al. proposed an efficient RFID anonymous authentication protocol. However, after each tag is authenticated in this protocol, an organization is required to anonymize the tag, which is very expensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous untraceable RFID mutual authentication method
  • Anonymous untraceable RFID mutual authentication method
  • Anonymous untraceable RFID mutual authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The symbols used in the examples are as follows:

[0024]

[0025]

[0026] The mutual authentication process of the present invention is roughly as follows:

[0027] System initialization: The issuer generates the public-private key pair of the reader, the public-private key pair of the tag and two secure hash functions. The background database connected with the reader stores the public key lists of all legal tags.

[0028] RFID Mutual Authentication Step: The reader sends a message to the tag. The tag uses its own private key and its own identity information to calculate the response value through simple multiplication and addition operations, and then sends the response value to the reader for authentication. The reader uses the tag public key to verify the response value. If the verification is passed, it means that the tag is legal; otherwise, it means that the tag is illegal. After the tag is verified to be legal, the reader uses its own private key to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous untraceable RFID mutual authentication method. Based on the problem that the safety of a Schnorr signature algorithm and the safety of a lightweight class symmetric encryption algorithm rely on discrete logarithms and are difficult to achieve, the anonymous untraceable RFID mutual authentication method has the advantages of being high in operating rate, small in storage space and the like. The phenomena that the tag cost is low and the computing power is limited are taken into consideration, a middle result which is possibly needed in the authentication process of tags is stored in the tags in a precomputation data set mode, the tags can be authenticated simply by generating random numbers through basic code operation such as Hash operation and addition and multiplication operation, and exponent operation with large operand is not needed. The anonymous untraceable RFID mutual authentication method reduces the time complexity of a system while information safety and user privacy are protected.

Description

technical field [0001] The invention relates to digital authentication technology, in particular to RFID mutual authentication technology. Background technique [0002] Radio Frequency Identification RFID systems use radio frequency technology for object identification in an open system environment. RFID is a non-physical contact, low-cost, low-power automatic identification technology. It mainly uses radio frequency technology to transmit information between the reader and the tag to obtain the information of the marked object. Although RFID has many advantages compared with traditional identification technology, because of some inherent limitations of RFID, it faces a huge challenge of information security. If the information security problems faced by RFID cannot be solved well, with the continuous expansion of its application, the potential great destructive power of RFID will gradually appear. [0003] An important challenge in RFID security issues is privacy leakage....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 许春香金春花张晓均陈文杰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products