Anti-quantum computing RFID authentication method and system based on asymmetric key pool and IBS

A quantum computing and authentication method technology, applied in the field of secure communication technology and equipment authentication, can solve the problems of insufficient identification security, slow identification process, unsuitable storage capacity RFID devices, etc., to reduce the risk of cracking, The effect of improving unpredictability and ensuring safety performance

Active Publication Date: 2020-02-07
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The existing identity authentication scheme based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server, and is not suitable for applications with a very small storage capacity. RFID device
Moreover, the security degree of the symmetric key algorithm is not high enough for identification: on the one hand, using the same symmetric key multiple times may lead to insufficient security of the key or even being cracked; on the other hand, any party with a symmetric key can make a A signature based on a symmetric key makes the anti-repudiation capability of the signature insufficient
[0007] 2. Existing schemes for identity authentication based on asymmetric keys, because asymmetric keys cannot be used publicly, must be encrypted to resist quantum computing, so the entire identity authentication process needs to use encryption algorithms for asymmetric keys or signatures encryption protection
Therefore, this method increases the amount of calculation for RFID devices, which may slow down the identification process; for battery-powered RFID, it will accelerate the consumption of power
[0008] 3. In the existing scheme of identity authentication based on asymmetric key pool, since the asymmetric key cannot be used publicly, only the random number of the public key pointer representing the position of the public key is disclosed to resist quantum computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and IBS
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and IBS
  • Anti-quantum computing RFID authentication method and system based on asymmetric key pool and IBS

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0046]It should be understood that, unless otherwise specified herein, the steps are not strictly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-quantum computing RFID authentication method based on an asymmetric key pool and an IBS. The participants comprise an authentication party and a request party which interact in an RFID mode. Each participant is configured with a key fob; an authentication party public key, a pointer address, an IBS signature public and private key pair, an IBS signature random number, an IBS signature parameter and an identity parameter issued by the authentication party are stored in a key card of the request party, and the identity parameter comprises an identity number of the request party, the request party public and private key pair and an offset public key. By adopting the method, the storage cost in the key fob of the requester can be reduced, and the security in the authentication interaction process of the requester and the requester can be improved.

Description

technical field [0001] The present application relates to the field of secure communication technology and equipment authentication technology, in particular to an anti-quantum computing RFID authentication method and system based on an asymmetric key pool and IBS. Background technique [0002] Radio Frequency Identification (RFID) is the abbreviation of Radio Frequency Identification. The principle is to conduct non-contact data communication between the reader and the tag to achieve the purpose of identifying the target. The application of RFID is very extensive. At present, typical applications include animal chips, car chip anti-theft devices, access control, parking lot control, production line automation, and material management. [0003] However, RFID systems face similar problems as traditional Internet networks, namely security issues. The RFID system is vulnerable to various attacks, mainly because the communication between the tag and the reader is realized in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32G06K7/10
CPCH04L9/0838H04L9/0869H04L9/0643H04L9/0825H04L9/0897H04L9/3247G06K7/10257
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products