浏览全部资源
扫码关注微信
1. 西安电子科技大学 通信工程学院,陕西 西安 710071
2. 北京电子科技学院 信息安全系,北京 100070
[ "李泽慧(1990-),女,陕西咸阳人,西安电子科技大学硕士生,主要研究方向为编码理论公钥密码体制、密码学与信息安全。" ]
[ "杨亚涛(1978-),男,河南平顶山人,博士,北京电子科技学院讲师、硕士生导师,主要研究方向为网络安全、可信计算等。" ]
[ "李子臣(1965-),男,河南焦作人,西安电子科技大学教授、硕士生导师,主要研究方向为密码学可信计算、信息安全与密码学等。" ]
网络出版日期:2014-11,
纸质出版日期:2014-11-30
移动端阅览
李泽慧, 杨亚涛, 李子臣. 基于QC-MDPC码的可证明安全RFID双向认证协议[J]. 通信学报, 2014,35(Z2):240-245.
Ze-hui LI, Ya-tao YANG, Zi-chen LI. Provable secure mutual RFID authentication protocol based on QC-MDPC code[J]. Journal on communications, 2014, 35(Z2): 240-245.
李泽慧, 杨亚涛, 李子臣. 基于QC-MDPC码的可证明安全RFID双向认证协议[J]. 通信学报, 2014,35(Z2):240-245. DOI: 10.3969/j.issn.1000-436x.2014.z2.033.
Ze-hui LI, Ya-tao YANG, Zi-chen LI. Provable secure mutual RFID authentication protocol based on QC-MDPC code[J]. Journal on communications, 2014, 35(Z2): 240-245. DOI: 10.3969/j.issn.1000-436x.2014.z2.033.
目前射频识别(RFID)系统安全问题日益严重,为了保护RFID系统中无线信道部分的信息交互安全,用准循环中密度奇偶校验码构造Niederreiter型公钥密码体制,基于这种加密模型提出一种RFID双向安全认证协议。利用规约技术证明该协议安全性,将攻击困难规约到线性码的译码困难问题。通过与其他RFID认证协议对比,在交互量、计算量和存储量等性能方面该协议也适用于资源有限且高效率的RFID系统。
The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system
a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols
this protocol is more suitable for RFID system in areas of interaction
computation and storage
which owns limited resource and needs high efficiency.
MOLNAR D , WAGNER D . Privacy and security in library RFID:issues,practices,and architectures [A ] . Proceedings of the 11th ACM Conference on Computer and Communications Security [C ] . ACM , 2004 . 210 - 219 .
HA J C , HA J H , MOON S J , et al . LRMAP:Lightweight and resynChronous Mutual Authentication protocol for RFID System [M ] . Springer Berlin Heidelberg , 2007 .
CHEN C L , DENG Y Y . Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection [J ] . Engineering Applications of Artificial Intelligence , 2009 , 22 ( 8 ): 1284 - 1291 .
CAI S , LI Y , LI T , et al . Attacks and improvements to an RIFD mutual authentication protocol and its extensions [A ] . Proceedings of the second ACM Conference on Wireless Network Security [C ] . ACM , 2009 . 51 - 58 .
PIRAMUTHU S . RFID mutual authentication protocols [J ] . Decision Support Systems , 2011 , 50 ( 2 ): 387 - 393 .
FELDHOFER M , DOMINIKUS S , WOLKERSTORFER J . Strong Authentication for RFID Systems Using the AES Algorithm [M ] . Springer Berlin Heidelberg , 2004 .
SARMA S E , WEIS S A , ENGELS D W . RFID Systems and Security and Privacy Implications [M ] . Springer Berlin Heidelberg , 2003 .
WEIS S A , SARMA S E , RIVEST R L , et al . Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems [M ] . Springer Berlin Heidelberg , 2004 .
HOPPER N J , BLUM M . Secure Human Identification Protocols [M ] . Springer Berlin Heidelberg , 2001 .
肖锋 , 周亚建 , 周景贤 , 等 . 标准模型下可证明安全的 RFID 双向认证协议 [J ] . 通信学报 , 2013 , 34 ( 4 ): 82 - 87 .
XIAO F , ZHOU Y J , ZHOU J X , et al . Provable secure mutual authentication protocol for RFID inthe standard model [J ] . Journal on Communications , 2013 , 34 ( 4 ): 82 - 87 .
JUELS A . RFID security and privacy:a research survey [J ] . IEEE Journal,Selected Areas in Communications , 2006 , 24 ( 2 ): 381 - 394 .
GÓDOR G , GICZI N , IMRE S . Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment [A ] . Wireless Pervasive Computing (ISWPC),2010 5th IEEE International Symposium [C ] . 2010 . 331 - 336 .
蔡庆玲 , 詹宜巨 , 余松森 等 . 基于NTRU公钥密码系统的RFID [J ] . 中山大学学报(自然科学版) , 2009 , 48 ( 5 ): 6 - 11 .
CAI Q L , ZHAN Y J , YU S S , et al . RFID communication security protocol based on NTRU public key cryptosystem [J ] . Acta Scientiarum Naturalium Universitatis SunyatSeni , 2009 , 48 ( 5 ): 6 - 11 .
NIEDERREITER H . Knapsack-type cryptosystems and algebraic coding theory [J ] . Problems of Control and Information Theory , 1986 , 15 ( 2 ): 159 - 166 .
GALLAGER R G . Low-density parity-check codes [J ] . Information Theory,IRE Transactions , 1962 , 8 ( 1 ): 21 - 28 .
MISOCZKI R , TILLICH J P , SENDRIER N , et al . MDPC-McEliece:New McEliece variants from moderate density parity-check codes [A ] . 2013 IEEE International Symposium Information Theory Proceedings (ISIT) [C ] . IEEE , 2013 . 2069 - 2073 .
SENDRIER N . On the use of structured codes in code based cryptography [A ] . Coding Theory and Cryptography III,The Royal Flemish Academy of Belgium for Science and the Arts [C ] . 2010 .
0
浏览量
0
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构