Mutual authentication method for lightweight-class RFID on elliptic curve

An elliptic curve and mutual authentication technology, applied in the field of RFID mutual authentication technology, can solve problems such as label information privacy, achieve the effect of protecting identity information and realizing mutual authentication

Inactive Publication Date: 2015-02-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But Zhang and Qi point out that Chou's pro

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual authentication method for lightweight-class RFID on elliptic curve
  • Mutual authentication method for lightweight-class RFID on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The symbols used in the implementation are described in the table below:

[0021]

[0022] In this scheme, there is no trusted third party as the issuing institution. Only server, reader and tag. The server generates the public-private key pair of the reader and the tag. Furthermore, the communication channel between reader and server is secure. So in this solution, we write the communication between the tag and the reader as the communication between the tag and the server.

[0023] (1) System initialization: the server generates its public-private key pair, tag identity information and two secure hash functions. The identity list of all legal labels is stored in the server.

[0024] The server chooses q, n two large prime numbers, and two hash functions H 1 with H 2 , an n-order generator P;

[0025] The server determines the elliptic curve E to be y 2 =x 3 +ax+b, where the elliptic curve constant a,b∈Z q ,Z q is a finite field of length q;

[0026] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mutual authentication method for a lightweight-class RFID on an elliptic curve. The mutual authentication method for the lightweight-class RFID on the elliptic curve aims to solve the problem that discrete logarithm on the elliptic curve is difficult. Under the same security strength condition, the algorithm of the mutual authentication method is smaller in key length, the operating speed is high, and storage space is small. Considering that the operating capability of a label is low, operation only relates to generation of a random number, Hash operation, point multiplication, addition and exclusive or in the authentication process. By the adoption of the mutual authentication method for the lightweight-class RFID on the elliptic curve, the identification information of the label is protected, mutual authentication between the label and a server is achieved, and a certain security and privacy requirement is met.

Description

technical field [0001] The invention relates to digital authentication technology, in particular to RFID mutual authentication technology. Background technique [0002] Radio Frequency Identification (RFID) is a fast, accurate, real-time collection and processing of information, automatic identification technology to achieve pervasive computing environment. The RFID system mainly uses radio frequency signals to achieve non-contact information transmission through spatial coupling, and achieves the purpose of mutual identification based on the transmitted information. [0003] In an authentication system, there are three parties, tags, readers and servers. The server contains the background database. The channel between the reader and the server is secure, the channel between the tag and the reader is not secure. An important challenge in RFID security issues is privacy leakage. Since the reader and the tag use radio frequency signals to communicate, the inherent vulnerab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 许春香金春花张晓均
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products