Anti-quantum computing RFID authentication method and system based on asymmetric key pool and secondary remainder

An asymmetric key and quantum computing technology, applied in the field of anti-quantum computing RFID authentication methods and systems, can solve the problems of insufficient signature anti-repudiation capability, accelerated power consumption, and insufficient identity security.

Active Publication Date: 2019-12-27
RUBAN QUANTUM TECH CO LTD +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing identity authentication scheme based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server, and is not suitable for applications with a very small storage capacity. RFID device
Moreover, the security degree of the symmetric key algorithm for identification is not high enough: on the one hand, using the same symmetric key multiple times may lead to insufficient security of the key or even being cracked; on the other hand, any party with the symmetric key can make

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and secondary remainder
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and secondary remainder
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and secondary remainder

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0071] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0072] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing RFID authentication method and system based on an asymmetric key pool and secondary remainder. The participants comprise an authentication party anda request party which interact in an RFID mode. Each participant is configured with a key fob; wherein an identity label, a true random number, a public key and a secret key pointer address of the requester are stored in a secret key card of the requester; wherein the key pointer address is used for extracting a corresponding asymmetric key unit from the asymmetric key pool, and by adopting the method, the storage cost in a key card of a requester can be reduced, and the safety in an authentication interaction process of the requester and the requester can be improved.

Description

technical field [0001] This application relates to the technical field of designing secure communication, in particular to an anti-quantum computing RFID authentication method and system based on an asymmetric key pool and quadratic remainder. Background technique [0002] Radio Frequency Identification (RFID) is the abbreviation of Radio Frequency Identification. RFID radio frequency identification technology is an earlier technology. In the 1950s, the theory of RFID radio frequency identification technology was developed. In the 1970s, some earlier RFID applications appeared, and RFID gradually entered the commercial stage. Since the 1980s, with the increasing attention to the standardization of RFID technology, RFID products have been more and more widely used. The principle is to conduct non-contact data communication between the reader and the tag to achieve the purpose of identifying the target. The application of RFID is very extensive. At present, typical applicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0825H04L9/0852H04L9/321H04L63/0442H04L63/08
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products