电信科学 ›› 2018, Vol. 34 ›› Issue (3): 105-111.doi: 10.11959/j.issn.1000-0801.2018107

• 研究与开发 • 上一篇    下一篇

基于二次剩余定理的标签所有权转移协议

谢锐1,郝志峰2   

  1. 1 广东工业大学,广东 广州 510006
    2 佛山科学技术学院,广东 佛山 528000
  • 修回日期:2018-01-31 出版日期:2018-03-01 发布日期:2018-04-02
  • 作者简介:谢锐(1977-),男,博士,广东工业大学讲师,主要研究方向为信息安全、数据挖掘。|郝志峰(1968-),男,博士,佛山科学技术学院教授、博士生导师,主要研究方向为机器学习、数据挖掘。
  • 基金资助:
    国家自然科学基金资助项目(61472090);国家自然科学基金资助项目(61472089);国家自然科学基金资助项目(61672169);广东省科技计划基金资助项目(2015B010128014);广东省科技计划基金资助项目(2016B010107002);广东省科技计划基金资助项目(2015B090906015);国家自然科学基金资助项目(201707010492);国家自然科学基金资助项目(201604016041);国家自然科学基金资助项目(201604016003);国家自然科学基金资助项目(201604016067)

Tag's ownership transfer protocol based on quadratic residue

Rui XIE1,Zhifeng HAO2   

  1. 1 Guangdong University of Technology,Guangzhou 510006,China
    2 Foshan University,Foshan 528000,China
  • Revised:2018-01-31 Online:2018-03-01 Published:2018-04-02
  • Supported by:
    The National Natural Science Foundation of China(61472090);The National Natural Science Foundation of China(61472089);The National Natural Science Foundation of China(61672169);The Science and Technology Project of Guangdong Province(2015B010128014);The Science and Technology Project of Guangdong Province(2016B010107002);The Science and Technology Project of Guangdong Province(2015B090906015);The Science and Technology Planning Project of Guangzhou(201707010492);The Science and Technology Planning Project of Guangzhou(201604016041);The Science and Technology Planning Project of Guangzhou(201604016003);The Science and Technology Planning Project of Guangzhou(201604016067)

摘要:

提出一种安全性更高且成本较低的所有权转移协议。所提协议在确保通信实体双向认证前提下,采用二次剩余定理,对传输信息进行加密;在通信实体相互识别过程中,随机数的加入可以使协议有效抵抗重放及去同步化等攻击;待所有权发生转移后,新的通信实体之间,通过动态方式生成后续认证所需要的密钥,从而降低通信实体的存储空间。所提协议与其他协议进行安全性及性能比对,表明所提协议具备所有权转移所需的安全性和较低的成本。

关键词: 射频识别, 二次剩余定理, 标签ID, 所有权转移, 随机数

Abstract:

A proprietary transfer protocol with higher security and lower cost was proposed.In order to ensure the communication entity authentication premise,two remainder theorems for information transmission encryption were used in the proposed protocol; in the process of mutual recognition of communication entities,the addition of random numbers could make the protocol effectively resist such attacks as replay and desynchronization.After the transfer of ownership occurs,new communication entities would be located.The authentication key needed to be dynamical,so as to reduce the storage space of communication entities.The performance comparison between the proposed protocol and other protocols for safety show that the proposed protocol has the security required for the transfer of ownership and low cost.

Key words: radio frequency identification, quadratic residue, tag's ID, ownership transfer, random number

中图分类号: 

No Suggested Reading articles found!