Journal on Communications ›› 2015, Vol. 36 ›› Issue (8): 83-90.doi: 10.11959/j.issn.1000-436x.2015228
• Academic paper • Previous Articles Next Articles
Bian-qing YUAN,Ji-qiang LIU
Online:
2015-08-25
Published:
2015-08-25
Supported by:
Bian-qing YUAN,Ji-qiang LIU. Provable secure ownership transfer protocol for RFID tag[J]. Journal on Communications, 2015, 36(8): 83-90.
"
方案 | T的存储需求1 | T的运算量 | CS的运算量2 | NS的运算量 | 交互次数3 |
文献[ | 1 | 3Po+Pf | (O(N)+1)Po+2Pe+ O(N)Pf | Po+Pe | 5 |
文献[ | 1 | 13Po+6Pf | (2O(N)+8)Po+(O(N)+1)Pf | 4Po+3Pf | 7 |
文献[ | 3 | 2Po+7Pf | Po+(O(1)+m+2)Pf | Po+(3+m)Pf | 6 |
文献[ | 3 | 6Po+Pm | (O(N)+1)Po+O(N)Pm | 5Po+Pm | 5 |
文献[ | 4 | 21Po+4Pm+5Pr+Pc | (2O(N)+5)Po+2Ps+Pr+Pc | 7Po+2Ps+3Pr | 10 |
本文方案 | 2 | 3Po+3Pf+Pm | (O(N)+2)Po+(O(N)+1)Pf | Po+Ps+Pf | 5 |
1统计是需要存储的参数数量;2统计是基于CS数据库中有N个标签的情况;3统计是协议执行过程中总的信息传输次数。 |
[1] | LIM C H , KWON T . Strong and robust RFID authentication enabling perfect ownership transfer[A]. 8th International Conference on Information and Communications Security[C]. Raleigh,NC,USA, 2006. 1-20. |
[2] | MOLNAR D , SOPPERA A , WAGNER D . A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags[A]. 12th International Workshop onSelected Areas in Cryptography[C]. Kingston,Ont,Canada, 2006. 276-290. |
[3] | OSAKA K , TAKAGI T , YAMAZAKI K ,et al. An efficient and secure RFID security method with ownership transfer[A]. Proceedings of IEEE 2006 International Conference on Computational Intelligence and Security[C]. Guangzhou,China, 2006. 1090-1095. |
[4] | FOULADGAR S , AFIFI H . An efficient delegation and transfer of ownership protocol for RFID tags[A]. Proceedings of the 1st International EURASIP Workshop on RFID Technology[C]. Vienna,Austria, 2007. 68-93. |
[5] | SONG B . RFID tag ownership transfer[EB/OL]. , 2008. |
[6] | RIZOMILIOTIS P , REKLEITIS E . Security analysis of the Song—Mitchell authentication protocol for low-cost RFID tags[J]. IEEE Communications Letters, 2009,13(4): 274-276. |
[7] | PERIS-LOPEZ P , HEMANDEZ-CASTRO J C , TAPIADOR J M E ,et al. Vulnerability analysis of RFID protocols for tag ownership transfer[J]. Computer Networks, 2010,54(9): 1502-1508. |
[8] | SONG B , MITCHELL C J . Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications, 2011,34(4): 556-566. |
[9] | 金永明, 孙惠平, 关志等 . RFID标签所有权转移协议研究[J]. 计算机研究与发展, 2011,48(8): 1400-1405. JIN Y M , SUN H P , GUAN Z ,et al. Ownership transfer protocol for RFID tag[J]. Journal of Computer Research and Development, 2011,48(8): 1400-1405. |
[10] | ELKHIYAOUI K , BLASS E O , MOLVA R . ROTIV:RFID ownership transfer with issuer verification[A]. LNCS7055:7th International Workshop on RFID Security and Privacy[C]. Berlin: Springer, 2012. 163-182. |
[11] | MORIYAMA D . Cryptanalysis and improvement of a provably secure RFID ownership transfer protocol[A]. LNCS8162:2nd International Workshop on Lightweight Cryptography for Security and Privacy[C]. Berlin: Springer, 2013. 114-129. |
[12] | KAPOOR G , PIRAMUTHU S . Single RFID tag ownership transfer protocols[J]. IEEE Transactions on Systems,Man,and Cybernetics–part C:Applications and Reviews, 2012,42(2): 164-173. |
[13] | DOSS R , ZHOU W , YU S . Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013,8(2): 390-401. |
[14] | CHEN C L , HUAN Y C , JIANG J R . A secure ownership transfer protocol using EPC global Gen-2 RFID[J]. Telecommunication Systems, 2013,53(4): 387-399. |
[15] | 周永彬, 冯登国 . RFID 安全协议的设计与分析[J]. 计算机学报, 2006,29(4): 581-589. ZHOU Y B , FENG D G . Design and analysis of cryptographic protocols for RFID[J]. Chinese Journal of Computers, 2006,29(4): 581-589. |
[16] | 邓淼磊, 马建峰, 周利华 . RFID 匿名认证协议的设计[J]. 通信学报, 2009,30(7): 20-26. DENG M L , MA J F , ZHOU L H . Design of anonymous authentication protocol for RFID[J]. Journal on Communications, 2009,30(7): 20-26. |
[17] | 肖锋, 周亚建, 周景贤 ,等. 标准模型下可证明安全的RFID双向认证协议[J]. 通信学报, 2013,34(4): 82-87. XIAO F , ZHOU Y J , ZHOU J X ,et al. Provable secure mutual authentication protocol for RFID in the standard model[J]. Journal on Communications, 2013,34(4): 82-87. |
[18] | CANETTI R . Universally composable security:a new paradigm for cryptographic protocols[A]. Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science[C]. Las Vegas,Nevada,USA, 2001. 136-145. |
[19] | 张帆, 孙璇, 马建峰 ,等. 供应链环境下通用可组合安全的 RFID 通信协议[J]. 计算机学报, 2008,31(10): 1754-1767. ZHANG F , SUN X , MA J F ,et al. A universally compoable secure RFID communication protocol in supply chains[J]. Chinese Journal of Computers, 2008,31(10): 1754-1767. |
[20] | BURMESTER M , TRI V L , DE MEDEIROS B ,et al. Universally composable RFID identification and authentication protocols[J]. ACM Transactions on Information and System Security, 2009,12(4): 1-33. |
[21] | BURMESTER M , MUNILLA J . Lightweight RFID authentication with forward and backward security[J]. ACM Transactions on Information and System Security, 2011,14(1): 11. |
[22] | 张忠, 徐秋亮 . 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011,34(7): 1188-1194. ZHANG Z , XU Q L . Universally compoable grouping-proof protocol for RFID tags in the Internet of things[J]. Chinese Journal of Computers, 2011,34(7): 1188-1194. |
[23] | CANETTI R . Obtaining universally compoable security:towards the bare bones of trust[A]. Proceedings of 13th International Conference on the Theory and Application of Cryptology and Informationsecurity[C]. 2007. 88-112. |
[24] | 李凤华, 冯涛, 马建峰 . 基于 VSPH 的 UC 不经意传输协议[J]. 通信学报, 2007,28(7): 28-34. LI F H , FENG T , MA J F . Universally composable oblivious transfer protocol based on VSPH[J]. Journal on Communications, 2007,28(7): 28-34. |
[25] | 张俊伟, 马建峰, 杨力 . UC安全的基于一次签名的广播认证[J]. 通信学报, 2010,31(5): 31-36. ZHANG J W , MA J F , YANG L . UC secure one-time signature based broadcast authentication[J]. Journal on Communications, 2010,31(5): 31-36. |
[26] | ZHANG J W , MA J F , MOON S J . Universally composable secure TNC model and EAP-TNC protocol in IF-T[J]. Science China Information Sciences, 2010,53(3): 465-482. |
[27] | 张俊伟, 马建峰, 杨超 . 安全定位协议的 UC 模型[J]. 通信学报, 2013,34(2): 117-122. ZHANG J W , MA J F , YANG C . UC model of secure positioning protocols[J]. Journal on Communications, 2013,34(2): 117-122. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Shengbao WANG, Xin ZHOU, Kang WEN, Bosen WENG. Tripartite authenticated key exchange protocol for smart grid [J]. Journal on Communications, 2023, 44(2): 210-218. |
[6] | Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain [J]. Journal on Communications, 2022, 43(8): 131-141. |
[7] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[8] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[9] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[10] | Liangbo XIE, Xixi LIU, Yong WANG, Mu ZHOU, Zengshan TIAN. Indoor EKF localization algorithm based on RFID carrier phase [J]. Journal on Communications, 2022, 43(3): 124-134. |
[11] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[12] | Youliang TIAN, Xiaoxia JIANG. Fair and rational delegation of computation in the universally composable framework [J]. Journal on Communications, 2021, 42(9): 106-119. |
[13] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[14] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[15] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|