计算机应用 ›› 2014, Vol. 34 ›› Issue (7): 1884-1889.DOI: 10.11772/j.issn.1001-9081.2014.07.1884

• 计算机安全 • 上一篇    下一篇

基于秘密共享密钥树的无线射频识别组证明协议

杨超1,2,张红旗1,2,杨智2,3,单棣斌2,3   

  1. 1. 河南省信息安全重点实验室,郑州 450001;
    2. 信息工程大学,郑州 450001
    3. 数字工程与先进计算国家重点实验室,郑州 450001
  • 收稿日期:2014-01-13 修回日期:2014-02-27 出版日期:2014-07-01 发布日期:2014-08-01
  • 通讯作者: 杨超
  • 作者简介:杨超(1988-),男,四川巴中人,硕士研究生,主要研究方向:物联网安全;张红旗(1962-),男,河北遵化人,教授,博士生导师,主要研究方向:网络安全、物联网安全、网络协议;杨智(1975-),男,河南开封人,副教授,博士,主要研究方向:信息安全、身份认证;单棣斌(1982-),男,河北邯郸人,讲师,硕士,主要研究方向:身份认证。
  • 基金资助:

    国家973计划项目;国家863计划项目;信息保障技术重点实验室开放基金资助项目

Radio frequency identification group proof protocol based on secret key-sharing tree

YANG Chao1,2,ZHANG Hongqi1,2,YANG Zhi2,3,SHAN Dibin2,3   

  1. 1. Henan Province Key Laboratory of Information Security, Zhengzhou Henan 450001, China;
    2. Information Engineering University, Zhengzhou Henan 450001, China;
    3. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou Henan 450001, China
  • Received:2014-01-13 Revised:2014-02-27 Online:2014-07-01 Published:2014-08-01
  • Contact: YANG Chao

摘要:

针对现有无线射频识别(RFID)组证明协议易受到重放、跟踪等安全威胁及组证明效率较低的问题,提出了基于秘密共享密钥树的RFID组证明协议。协议设计了基于秘密共享方案的组证明密钥结构,将组密钥多次拆分生成密钥树增加了密钥结构的复杂度,加大了攻击者试图恢复组密钥的难度,提高了安全性;阅读器与每个标签只需一次交互便可以完成标签合法性认证及组证明信息的收集,提高了组证明效率。表明该协议较联合证明协议、基于椭圆曲线密码体制(ECC)的组证明协议、基于树的组证明协议等在安全和性能方面具有明显提高。

Abstract:

Aimed at the problem that existing RFID (Radio Frequency Identification) group proof protocols are inefficient and easily encounter many attacks like replay, tracking and so on, this paper proposed a new group proof protocol based on secret key-sharing tree. This protocol designed a new secret group-proofing key construction based on secret key sharing scheme. The group-proofing key was divided many times into many sub-keys to creat a key tree. This method increased the complexity of the construction of the secret key, increased the difficulty of that attackers attempt to recover the group key and increased the security of tag's group proof. The reader interacts with each tag only once to authenticate its validity and collect the group-proof information. This protocol enormously increases the proof efficiency. Compared to the existing protocols such as Yoking-Proofs, ECC-based and Tree-based, this protocol has better security and higher efficiency.

中图分类号: