A security authentication method for limited distance of RFID
A technology of security authentication and distance, applied in the field of security authentication, can solve the problems of not considering the authentication distance, the radiation hazard of high-power transmitters, and the poor anti-attack ability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] Below in conjunction with describe technical scheme of the present invention in detail:
[0023] system initialization:
[0024] According to the security parameter l, the issuer selects the corresponding elliptic curve group G and the whole ring Zp with modulus p, randomly selects a y from Zp as the private key of the reader, and calculates Y=yP as the public key of the reader ;Randomly select an x from Zp as the tag’s private key, and calculate X=xP as the tag’s public key; send x, Y to the tag secretly, and y, X to the reader; where, the order of G is p, the generator is P;
[0025] Initialization of the reader: According to the security parameter l, the reader determines the maximum distance ∈ between a legal tag and itself; at the same time, according to ∈ and the system parameters, the reader determines the maximum number of communication rounds n and the maximum round communication required time Δt.
[0026] The specific methods for reader authentication tag...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More