Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing RFID authentication method and system based on symmetric key pool and online and offline signatures

A symmetric key and quantum computing technology, which is applied in the field of secure communication, can solve the problems of server key storage pressure, insufficient identification security, and insufficient key security.

Active Publication Date: 2020-01-03
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The existing identity authentication scheme based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server, and is not suitable for applications with a very small storage capacity. RFID device
Moreover, the security degree of the symmetric key algorithm for identification is not high enough: on the one hand, using the same symmetric key multiple times may lead to insufficient security of the key or even being cracked; on the other hand, any party with the symmetric key can make Signature, making the signature's anti-repudiation ability insufficient
[0006] 2. The existing identity authentication scheme based on the asymmetric key pool, because the asymmetric key cannot be used publicly, it must be encrypted to resist quantum computing, so the entire identity authentication process needs to use encryption algorithms for asymmetric keys or Signature for encryption protection
Therefore, this method increases the amount of calculation for RFID devices, which may slow down the identification process; for battery-powered RFID, it will accelerate the consumption of power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and online and offline signatures
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and online and offline signatures
  • Anti-quantum computing RFID authentication method and system based on symmetric key pool and online and offline signatures

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0063] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0064] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing RFID authentication method and system based on a symmetric key pool and online and offline signatures. The parties comprise an authentication party and a request party which interact with each other in an RFID mode, wherein each party is configured with a key fob; algorithm parameters are stored in the key fob; an identity label and a public key of the request party, a private key corresponding to the public key, a temporary public key, a temporary private key corresponding to the temporary public key and a symmetric key unit are stored in a key fob of the request party; a symmetric key pair is stored in the symmetric key unit, and the symmetric key pair comprises a first symmetric key, a second symmetric key and a key pointer address; andthe key pointer address is used for extracting a related symmetric key unit from a symmetric key pool. By adopting the anti-quantum computing RFID authentication method, the storage cost in the key fob of the request party can be reduced, and the security in the authentication interaction process of the request party and the request party can be improved.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum computing-resistant RFID authentication method and system based on a symmetric key pool and online and offline signatures. Background technique [0002] Radio Frequency Identification (RFID) is the abbreviation of Radio Frequency Identification. RFID radio frequency identification technology is an earlier technology. In the 1950s, the theory of RFID radio frequency identification technology was developed. In the 1970s, some earlier RFID applications appeared, and RFID gradually entered the commercial stage. Since the 1980s, with the increasing attention to the standardization of RFID technology, RFID products have been more and more widely used. The principle is to conduct non-contact data communication between the reader and the tag to achieve the purpose of identifying the target. The application of RFID is very extensive. At present, typical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08H04L9/32G06K7/10
CPCH04L9/3247H04L9/0897H04L9/0891H04L9/0877H04L9/0869H04L9/0852H04L9/0825H04L9/0643G06K7/10257
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products