Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous untraceable rfid mutual authentication method

A mutual authentication and multiplication group technology, applied in the field of RFID mutual authentication technology, can solve the problems of not meeting the low-cost requirements of RFID tags, not giving the implementation method, and not having scalability, etc., to achieve fast operation speed and reduce time complexity The effect of high speed and small storage space

Inactive Publication Date: 2017-07-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] At present, there are some anonymous authentication protocols, but they all have certain security performance and other problems.
In 2006, Heydt designed an anonymous payment system for bus tickets based on anonymous certificates, but the scheme did not give the specific implementation method of the system
In 2009, Bichsel proposed a method of implementing anonymous certificates based on Java Cards, but all devices need to implement public key cryptographic algorithms, which does not meet the low-cost requirements of RFID tags.
In 2009, Blass gave an applicable anonymous payment scheme based on RFID, but the scheme requires the number of tags in the system to be fixed, which makes the scheme not very scalable
In 2010, Armknecht et al. proposed an efficient RFID anonymous authentication protocol. However, after each tag is authenticated in this protocol, an organization is required to anonymize the tag, which is very expensive.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous untraceable rfid mutual authentication method
  • Anonymous untraceable rfid mutual authentication method
  • Anonymous untraceable rfid mutual authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The symbols used in the examples are as follows:

[0024]

[0025]

[0026] The mutual authentication process of the present invention is roughly as follows:

[0027] System initialization: The issuer generates the public-private key pair of the reader, the public-private key pair of the tag and two secure hash functions. The background database connected with the reader stores the public key lists of all legal tags.

[0028] RFID Mutual Authentication Step: The reader sends a message to the tag. The tag uses its own private key and its own identity information to calculate the response value through simple multiplication and addition operations, and then sends the response value to the reader for authentication. The reader uses the tag public key to verify the response value. If the verification is passed, it means that the tag is legal; otherwise, it means that the tag is illegal. After the tag is verified to be legal, the reader uses its own private key to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anonymous and untraceable RFID mutual authentication method, which is based on a Schnorr signature algorithm and a lightweight symmetric encryption algorithm. Its security depends on the discrete logarithm problem, and has the advantages of fast operation speed and small storage space. Considering that the cost of the tag is low and the computing power is limited, the intermediate results that the tag may need during authentication are stored in the tag in the form of a pre-calculated data set. In the present invention, the tag only needs to generate random numbers and Hash operations. Basic cryptographic operations such as addition and multiplication operations can achieve authentication without the need for computationally intensive exponential operations. The present invention reduces the time complexity of the system while protecting information security and user privacy.

Description

technical field [0001] The invention relates to digital authentication technology, in particular to RFID mutual authentication technology. Background technique [0002] Radio Frequency Identification RFID systems use radio frequency technology for object identification in an open system environment. RFID is a non-physical contact, low-cost, low-power automatic identification technology. It mainly uses radio frequency technology to transmit information between the reader and the tag to obtain the information of the marked object. Although RFID has many advantages compared with traditional identification technology, because of some inherent limitations of RFID, it faces a huge challenge of information security. If the information security problems faced by RFID cannot be solved well, with the continuous expansion of its application, the potential great destructive power of RFID will gradually appear. [0003] An important challenge in RFID security issues is privacy leakage....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 许春香金春花张晓均陈文杰
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA