Anonymous untraceable rfid mutual authentication method
A mutual authentication and multiplication group technology, applied in the field of RFID mutual authentication technology, can solve the problems of not meeting the low-cost requirements of RFID tags, not giving the implementation method, and not having scalability, etc., to achieve fast operation speed and reduce time complexity The effect of high speed and small storage space
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The symbols used in the examples are as follows:
[0024]
[0025]
[0026] The mutual authentication process of the present invention is roughly as follows:
[0027] System initialization: The issuer generates the public-private key pair of the reader, the public-private key pair of the tag and two secure hash functions. The background database connected with the reader stores the public key lists of all legal tags.
[0028] RFID Mutual Authentication Step: The reader sends a message to the tag. The tag uses its own private key and its own identity information to calculate the response value through simple multiplication and addition operations, and then sends the response value to the reader for authentication. The reader uses the tag public key to verify the response value. If the verification is passed, it means that the tag is legal; otherwise, it means that the tag is illegal. After the tag is verified to be legal, the reader uses its own private key to c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


