Provable secure mutual RFID authentication protocol based on QC-MDPC code
Correspondences|更新时间:2024-06-05
|
Provable secure mutual RFID authentication protocol based on QC-MDPC code
Journal on CommunicationsVol. 35, Issue Z2, Pages: 240-245(2014)
作者机构:
1. 西安电子科技大学 通信工程学院,陕西 西安 710071
2. 北京电子科技学院 信息安全系,北京 100070
作者简介:
基金信息:
The National Natural Science Foundation of China(61370188);Beijing Higher Education Young Elite Teacher Project——Fundamental Research Funds for the Central Universities;Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute
The security of radio frequency identification (RFID) has become an increasingly severe issue.In order to protect the security of information interaction in wireless channel of RFID system
a mutual RFID authentication secure protocol was proposed.It was like the Niederreiter type public cryptography which based on the quasi-cyclic medium density parity check code(QC-MDPC).The security proof for this novel protocol was given by using a reduction method ,and the hardness of attacking was reduced to the decoding problem of the linear codes.Besides the performance results also exhibit that compared with other RFID authentication protocols
this protocol is more suitable for RFID system in areas of interaction
computation and storage
which owns limited resource and needs high efficiency.
关键词
Keywords
references
MOLNAR D , WAGNER D . Privacy and security in library RFID:issues,practices,and architectures [A ] . Proceedings of the 11th ACM Conference on Computer and Communications Security [C ] . ACM , 2004 . 210 - 219 .
HA J C , HA J H , MOON S J , et al . LRMAP:Lightweight and resynChronous Mutual Authentication protocol for RFID System [M ] . Springer Berlin Heidelberg , 2007 .
CHEN C L , DENG Y Y . Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection [J ] . Engineering Applications of Artificial Intelligence , 2009 , 22 ( 8 ): 1284 - 1291 .
CAI S , LI Y , LI T , et al . Attacks and improvements to an RIFD mutual authentication protocol and its extensions [A ] . Proceedings of the second ACM Conference on Wireless Network Security [C ] . ACM , 2009 . 51 - 58 .
PIRAMUTHU S . RFID mutual authentication protocols [J ] . Decision Support Systems , 2011 , 50 ( 2 ): 387 - 393 .
FELDHOFER M , DOMINIKUS S , WOLKERSTORFER J . Strong Authentication for RFID Systems Using the AES Algorithm [M ] . Springer Berlin Heidelberg , 2004 .
SARMA S E , WEIS S A , ENGELS D W . RFID Systems and Security and Privacy Implications [M ] . Springer Berlin Heidelberg , 2003 .
WEIS S A , SARMA S E , RIVEST R L , et al . Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems [M ] . Springer Berlin Heidelberg , 2004 .
HOPPER N J , BLUM M . Secure Human Identification Protocols [M ] . Springer Berlin Heidelberg , 2001 .
XIAO F , ZHOU Y J , ZHOU J X , et al . Provable secure mutual authentication protocol for RFID inthe standard model [J ] . Journal on Communications , 2013 , 34 ( 4 ): 82 - 87 .
JUELS A . RFID security and privacy:a research survey [J ] . IEEE Journal,Selected Areas in Communications , 2006 , 24 ( 2 ): 381 - 394 .
GÓDOR G , GICZI N , IMRE S . Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment [A ] . Wireless Pervasive Computing (ISWPC),2010 5th IEEE International Symposium [C ] . 2010 . 331 - 336 .
CAI Q L , ZHAN Y J , YU S S , et al . RFID communication security protocol based on NTRU public key cryptosystem [J ] . Acta Scientiarum Naturalium Universitatis SunyatSeni , 2009 , 48 ( 5 ): 6 - 11 .
NIEDERREITER H . Knapsack-type cryptosystems and algebraic coding theory [J ] . Problems of Control and Information Theory , 1986 , 15 ( 2 ): 159 - 166 .
GALLAGER R G . Low-density parity-check codes [J ] . Information Theory,IRE Transactions , 1962 , 8 ( 1 ): 21 - 28 .
MISOCZKI R , TILLICH J P , SENDRIER N , et al . MDPC-McEliece:New McEliece variants from moderate density parity-check codes [A ] . 2013 IEEE International Symposium Information Theory Proceedings (ISIT) [C ] . IEEE , 2013 . 2069 - 2073 .
SENDRIER N . On the use of structured codes in code based cryptography [A ] . Coding Theory and Cryptography III,The Royal Flemish Academy of Belgium for Science and the Arts [C ] . 2010 .