Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing RFID authentication method and system based on asymmetric key pool and quadratic remainder

An asymmetric key, quantum computing technology, applied in the field of anti-quantum computing RFID authentication methods and systems, can solve the problems of insufficient identity identification security, insufficient signature anti-repudiation capability, accelerated power consumption, etc., and is not easy to crack. Effect

Active Publication Date: 2021-10-22
RUBAN QUANTUM TECH CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing identity authentication scheme based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server, and is not suitable for applications with a very small storage capacity. RFID device
Moreover, the security degree of the symmetric key algorithm for identification is not high enough: on the one hand, using the same symmetric key multiple times may lead to insufficient security of the key or even being cracked; on the other hand, any party with the symmetric key can make Signature, making the signature's anti-repudiation ability insufficient
[0006] 2. The existing identity authentication scheme based on the asymmetric key pool, because the asymmetric key cannot be used publicly, it must be encrypted to resist quantum computing, so the entire identity authentication process needs to use encryption algorithms for asymmetric keys or Signature for encryption protection
Therefore, this method increases the amount of calculation for RFID devices, which may slow down the identification process; for battery-powered RFID, it will accelerate the consumption of power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and quadratic remainder
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and quadratic remainder
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and quadratic remainder

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] Next, the technical solutions in the embodiments of the present invention will be described in connection with the drawings of the embodiments of the present invention, and it is understood that the described embodiments are merely the embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the range of the present invention without making creative labor premise.

[0071] In order to better describe and explain the embodiments of the present application, refer to a plurality of drawings, but additional detail or examples for describing the accompanying drawings should not be considered to be created for the invention of the invention, the implementation described The scope of any of the examples or preferred mode.

[0072] It should be understood that unless otherwise specified herein, the implementation of each step is not strictly limite...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to an anti-quantum computing RFID authentication method and system based on an asymmetric key pool and quadratic remainder. The participating parties include the authentication party and the requesting party that interact through RFID, and each of the participating parties is configured with Key card, the key card of the requesting party stores its own identity, true random number, public key and key pointer address, and the key pointer address is used to extract the corresponding key from the asymmetric key pool The asymmetric key unit adopts the method, which can reduce the storage cost in the key card of the requesting party, and improve the security in the authentication interaction process between the two parties.

Description

Technical field [0001] The present application relates to the field of design security communication, and in particular, to a non-symmetric key pool and a secondary remaining anti-quantum computational RFID authentication method and system. Background technique [0002] RF recognition (RFID) is an abbreviation for Radio Frequency Identification. RFID RFIT is an earlier technology. In the 1950s, the theory of RFID RF identification technology was developed. In the 1970s, some earlier RFID applications occurred, and RFID gradually entered the business stage. Since the 1980s, with the renewal of RFID technology, RFID products are increasingly widely adopted. The principle is a non-touchd data communication between the reader and the tag to achieve the purpose of identifying the target. RFID is very extensive, currently typical application with animal wafers, automotive wafers, access control, parking control, production line automation, material management. [0003] In the prior art...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0825H04L9/0852H04L9/321H04L63/0442H04L63/08
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products