RFID system bidirectional authentication method based on decoy state quantum random key

A decoy state quantum, two-way authentication technology, applied in the field of RFID system two-way authentication based on decoy state quantum randomization keys, can solve the problems of limited computing power and easy theft of private data, and achieve the effect of enhancing security

Inactive Publication Date: 2016-08-31
QINGDAO TECHNOLOGICAL UNIVERSITY
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Between the EPC information server and the RFID reader, and between the RFID tag and the RFID reader, due to limited computing power, l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RFID system bidirectional authentication method based on decoy state quantum random key
  • RFID system bidirectional authentication method based on decoy state quantum random key
  • RFID system bidirectional authentication method based on decoy state quantum random key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] In embodiment one, the RFID system two-way authentication method based on decoy state quantum randomization key of the present invention comprises the following steps:

[0043] Step (1): The RFID reader associates with the EPC information server, and starts the EPC information server;

[0044] Step (2): After the EPC information server is started, the EPC information server sends two kinds of weakly coherent lights, the information state and the decoy state, to the RFID reader with equal probability;

[0045] Step (3): The RFID reader receives two kinds of weakly coherent lights, the information state and the decoy state, and extracts the key;

[0046] Step (4): The RFID reader sends the key to the RFID tag; the RFID tag encrypts the tag information, and forwards the encrypted tag information to the EPC information server through the RFID reader for authentication. If the authentication is successful, then Go to the next step; otherwise, the authentication fails;

[0...

Embodiment 2

[0101] The two-way authentication method in Embodiment 2 includes the following steps:

[0102] Step (1): The RFID reader associates with the EPC information server, and starts the EPC information server;

[0103] Step (2): The RFID reader receives two weakly coherent lights, the information state and the decoy state, sent by the EPC information server with equal probability, extracts the key, and sends the key to the RFID tag;

[0104] Step (3): The RFID reader receives the tag information encrypted by the RFID tag, and forwards it to the EPC information server for authentication. If the authentication is successful, enter the next step; otherwise, the authentication fails;

[0105] Step (4): The RFID reader receives the tag information encrypted by the EPC information server and stored in the EPC information server, and forwards it to the RFID tag for authentication. If the authentication is successful, the two-way authentication of the RFID system is successful; otherwise, ...

Embodiment 3

[0126] The RFID system two-way authentication method based on the decoy state quantum randomization key comprises the following steps:

[0127] Step (1): After the EPC information server receives the associated information sent by the RFID reader, start the EPC information server;

[0128] Step (2): The EPC information server sends two weakly coherent lights, the information state and the decoy state, to the RFID reader with equal probability;

[0129] Step (3): The EPC information server receives the encrypted tag information and performs authentication, and if the authentication is successful, enters the next step; otherwise, the authentication fails;

[0130] The encrypted tag information is the tag information that the RFID tag encrypts according to the received key, and the key is the key extracted by the RFID reader according to two kinds of weak coherent light in the information state and the decoy state;

[0131] Step (4): The EPC information server encrypts the tag i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an RFID system bidirectional authentication method based on a decoy state quantum random key. The method comprises: step (1), an RFID reader is associated with an EPC information server and the EPC information server is started; step (2), the RFID reader receives information-state and decoy-state weak coherent light that is sent by the EPC information server in an equal probability mode, extracts a secret key, and sends the secret key to an RFID tag; step (3), the RFID reader receives tag information of RFID tag after encryption and forwards the information to the EPC information server for authentication; if authentication is done successfully, a next step is executed; and otherwise, authentication fails; and step (4), the RFID reader receives the tag information that is encrypted by the EPC information server and is stored into the EPC information server and forwards the information to the RFID tag for authentication; if the authentication is done successfully, the RFID system carried out bidirectional authentication successfully; and otherwise, the authentication fails.

Description

technical field [0001] The invention belongs to the field of communication, and in particular relates to a two-way authentication method for an RFID system based on a decoy state quantum randomization key. Background technique [0002] RFID (Radio Frequency Identification Devices) is an important part of the IoT (Internet of Things) system. The system uses tags, readers, information servers (Electronic Product Code Information Service) and other equipment to exchange information and communicate according to agreed protocols, so as to realize intelligent identification of objects, privacy positioning, security monitoring and intelligent management. [0003] The rich data stored in RFID tags in the Internet of Things has insufficient hardware protection capabilities and is easily read illegally, and its security has seriously affected the healthy development of the entire system of the Internet of Things. The computing power of RFID hardware equipment is very limited, and lig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0852H04L9/3273H04L2209/805
Inventor 马鸿洋初鹏程腾济凯史鹏
Owner QINGDAO TECHNOLOGICAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products