期刊文献+

重加密技术在RFID安全中的应用 被引量:11

Application of Re-encryption Technology in RFID Security
下载PDF
导出
摘要 RFID的普遍应用引起了安全问题,在众多的RFID安全解决方案中重加密技术具有很多优点。该文描述重加密的优势,介绍重加密在RFID安全应用中的发展现状,提出了重加密在RFID中的应用模型和安全要求,指出重加密存在的弱点,对重加密间隔内的跟踪问题给出了解决对策,探讨了抗置换攻击问题。 The prevailing of RFID arouses the security concern. Re-encryption is an approach with many advantages among approaches for RFID security. This paper describes the advantage of re-encryption and introduces the development of the application of re-encryption in RF[D security. It promotes an application model for re-encryption in RFID security and security requirement, and points out that re-encryption has its short points. As to the tracking problem between re-encryption, it promotes the solution, and discusses the solution for the swapping attack in re-encryption system.
出处 《计算机工程》 CAS CSCD 北大核心 2008年第3期160-162,共3页 Computer Engineering
基金 天津市应用基础研究计划基金资助项目(06YFJMJC00200) 天津市高等学校科技发展基金资助项目(20051518) 南开大学创新基金资助项目
关键词 RFID技术 安全 隐私 重加密 RFID technology security privacy re-encryption
  • 相关文献

参考文献7

  • 1Juels A. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
  • 2周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 3Juels A, Pappu R. Squealing Euros: Privacy Protection in RFID-enabled Banknotes[C]//Proc. of Financial Cryptography'03. Berlin: Springer-Verlag, 2003, 2742: 103-121.
  • 4Avoine G. Privacy Issues in RFID Banknote Protection Schemes[C]//Proc. of the 6th International Conference on Smart Card Research and Advanced Applications CARDIS. Holand: IFIE Kluwer Academic Publishers, 2004: 33-48.
  • 5Golle P, Jakobsson M, Juels A, et al. Universal Re-encryption for Mixnets[C]//Proc. of RSA Conference Cryptographers' Track. Berlin: Springer-Verlag, 2004, 2964:163-178.
  • 6Saito J, Ryou J C, Sakurai K. Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags[C]//Proceedings of the International Conference on Embedded and Ubiquitous Computing. Berlin: Springer-Verlag, 2004, 3207: 879-890.
  • 7Ateniese G. Camenisch J, Madeiros B D. Untraceable RFID Tags Via Insubvertible Encryption[C]//Proc of the 12th ACM Conference on Computer and Communication Security. NY USA: ACM Press, 2005: 92-101.

二级参考文献28

  • 1Sarma S.E,Weis S.A,Engels D.W..RFID systems and security and privacy implications.In:Kaliski B.S,Koc C.K,Paar C.eds..Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002).Lectures Notes in Computer Science 2523.Berlin:Springer-Verlag,2003,454~469
  • 2Sarma S.E,Weis S.A,Engels D.W..Radio-frequency identification:Secure risks and challenges.RSA Laboratories Cryptobytes,2003,6(1):2~9
  • 3Weis S.A,Sarma S.E,Rivest R.L,Engels D.W..Security and privacy aspects of low-cost radio frequency identification systems.In:Hutter D,Müller G,Stephan W,Ullmann M.eds..Proceedings of the 1st International Conference on Security in Pervasive Computing.Lectures Notes in Computer Science 2802.Berlin:Springer-Verlag,2004,201~212
  • 4Ohkubo M,Suzuki K,Kinoshita S..Hash-chain based forward-secure privacy protection scheme for low-cost RFID.In:Proceedings of the 2004 Symposium on Cryptography and Information Security(SCIS 2004),Sendai,2004,719~724
  • 5Henrici D,Muller P..Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers.In:Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW'04),Washington,DC,USA,2004,149~153
  • 6Molnar D,Wagner D..Privacy and security in library RFID:Issues,practices,and architectures.In:Proceedings of the 11th ACM Conference on Computer and Communications Security(CCS'04),Washington,DC,USA,2004,210~219
  • 7Rhee K,Kwak J,Kim S,Won D..Challenge-response based RFID authentication protocol for distributed database environment.In:Hutter D,Ullmann M.eds..Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005).Lectures Notes in ComPuter Science 3450.Berlin:Springer-Verlag,2005,70~84
  • 8Lee S.M,Hwang Y.J,Lee D.H,Lim J.I..Efficient authentication for low-cost RFID systems.In:Gervasi O,Gavrilova M.L,Kumar V,Laganà A,Lee H.P,Mun Y,Taniar D,Tan C.J.K.eds..Proceedings of the International Conference on Computational Science and Its Applications (ICCSA 2005).Lectures Notes in Computer Science 3480.Berlin:Springer-Verlag,2005,619~627
  • 9Juels A,Pappu R..Squealing Euros:Privacy protection in RFID-enabled banknotes.In:Wright R.N.ed..Proceedings of the 7th International Conference on Financial Cryptography (FC'03).Lectures Notes in Computer Science 2742.Berlin:Springer-Verlag,2003,103 ~ 121
  • 10Saito J,Ryou J.C,Sakurai K..Enhancing privacy of universal re-encryption scheme for RFID tags.In:Yang L.T,Guo M,Gao G.R,Jha N.K.eds..Proceedings of the International Conference on Embedded and Ubiquitous Computing (EUC 2004).Lectures Notes in Computer Science 3207.Berlin:Springer-Verlag,2004,879~890

共引文献210

同被引文献155

引证文献11

二级引证文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部