A lightweight RFID mutual authentication method on elliptic curves

An elliptic curve, mutual authentication technology, applied in the field of RFID mutual authentication technology, can solve problems such as label information privacy, achieve the effect of protecting identity information and realizing mutual authentication

Inactive Publication Date: 2017-07-11
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But Zhang and Qi point out that Chou's protocol has label information privacy issues.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight RFID mutual authentication method on elliptic curves
  • A lightweight RFID mutual authentication method on elliptic curves

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] The symbols used in the implementation are described in the table below:

[0021]

[0022] In this scheme, there is no trusted third party as the issuing institution. Only server, reader and tag. The server generates the public-private key pair of the reader and the tag. Furthermore, the communication channel between reader and server is secure. So in this solution, we write the communication between the tag and the reader as the communication between the tag and the server.

[0023] (1) System initialization: the server generates its public-private key pair, tag identity information and two secure hash functions. The identity list of all legal labels is stored in the server.

[0024] The server chooses q, n two large prime numbers, and two hash functions H 1 with H 2 , an n-order generator P;

[0025] The server determines the elliptic curve E to be y 2 =x 3 +ax+b, where the elliptic curve constant a,b∈Z q ,Z q is a finite field of length q;

[0026] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight RFID mutual authentication method on an elliptic curve. The invention is based on the difficult problem of discrete logarithm on the elliptic curve. Under the same security strength, the algorithm has a shorter key length, fast operation speed and small storage space. Considering the weak computing power of tags, the operations in the authentication process only involve generating random numbers, hash operations, dot multiplication, addition, and XOR. The invention protects the identity information of the tag, realizes the mutual authentication between the tag and the server, and achieves certain security and privacy requirements.

Description

technical field [0001] The invention relates to digital authentication technology, in particular to RFID mutual authentication technology. Background technique [0002] Radio Frequency Identification (RFID) is a fast, accurate, real-time collection and processing of information, automatic identification technology to achieve pervasive computing environment. The RFID system mainly uses radio frequency signals to achieve non-contact information transmission through spatial coupling, and achieves the purpose of mutual identification based on the transmitted information. [0003] In an authentication system, there are three parties, tags, readers and servers. The server contains the background database. The channel between the reader and the server is secure, the channel between the tag and the reader is not secure. An important challenge in RFID security issues is privacy leakage. Since the reader and the tag use radio frequency signals to communicate, the inherent vulnerab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 许春香金春花张晓均
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products