期刊文献+

基于McEliece体制的RFID安全协议 被引量:4

RFID Security Protocol Based on McEliece Mechanism
下载PDF
导出
摘要 射频识别(RFID)作为一种新的自动识别技术被广泛地应用于人们的日常生活中,隐私安全问题也逐渐受到人们的重视。该文分析现有的一种公钥加密体制——McEliece体制,并对其进行改进,设计一种RFID安全协议。研究分析表明,该安全协议可以有效地避免对称加密协议中容易出现的由于数据库不同步导致的拒绝服务攻击问题,具有较好的实用性。 Radio Frequency Identification(RFID) as a new automated identification technology has been widely used in people's daily lives. Privacy and security issues become a central concern. This paper discusses the McEliece Cipher's secure capability and proposes an RFID security protocol with the improved version. Research and analysis show that the protocol can avoid the denial of service attacks appeared in the symmetric encryption protocols and protect the RFID data practically.
机构地区 电子工程学院 [
出处 《计算机工程》 CAS CSCD 北大核心 2009年第8期171-173,共3页 Computer Engineering
关键词 射频识别 McEliece体制 安全协议 Radio Frequency Identification(RFID) McEliece mechanism security protocol
  • 相关文献

参考文献6

  • 1李刚,曾锐利,林凌.基于射频识别技术的智能交通系统[J].信息与控制,2006,35(5):555-559. 被引量:20
  • 2刘发贵,蒋瑞林,胡耀民.RFID中间件及其仓储管理的应用[J].计算机工程,2006,32(13):272-273. 被引量:36
  • 3陈斗雪,黎毅明,陈一天,李节.无线射频识别及其在制造业中的应用[J].计算机工程与设计,2006,27(8):1359-1361. 被引量:17
  • 4Patterson N J. The Algebraic Decoding of Goppa Codes[J]. IEEE Transaction on Information Theory, 1975, 21(2): 203-207.
  • 5McEliece R, Miller J. A Public-key Cryptosystem Based on Algebraic Coding Theory[D]. CA, USA: Jet Propulsion Laboratories, California Institute of Technology, 1978:114-116.
  • 6Mache J, Allick C. The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols[C]//Proc. of the 2nd International Conference on Availability, Reliability and Security. Washington D. C., USA: [s. n.], 2007: 606-609.

二级参考文献18

共引文献69

同被引文献22

  • 1李波,刘震宇,谢胜利.RFID在现代军事领域的应用探讨[J].电脑与电信,2006(7):16-23. 被引量:15
  • 2王爱玲,盛小宝,夏志君.美军军事物流领域中RFID应用研究[J].物流科技,2007,30(5):160-162. 被引量:8
  • 3Sarma S E,Weis S A.Radio-frequency Identification:Secure Risks and Challenges[J].RSA Laboratories Cryptobytes,2003,6(1):2-9.
  • 4Weis S A.Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C]//Proc.of the 1st International Conference on Security in Pervasive Computing.Berlin,Germany:Springer-Verlag,2004:201-212.
  • 5Elgamal T.A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J].IEEE Trans.on Info.Theory,1985,31(4):469-472.
  • 6Avoine G, Oechslin P. A Scalable and Provably Secure Hash- based RFID Protocol[C]//Proc. of Conf. on Pervasive Computing and Communication Security. [S. 1.]: IEEE Computer Society, 2005.
  • 7Golle P, Jakobsson M, Juels A, et al. Universal Re-encryption for Mixnets[C]//Proc. of RSA Conference on Cryptographers' Track. Berlin, Germany: Springer-Verlag, 2004: 163-178.
  • 8Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]//Proc. of 1990 IEEE Symp. on Research in Security and Privacy. Los Alamitos, USA: IEEE Computer Society, 1990: 234-248.
  • 9IEC 61970-301.EMSAPI-Part 301:Common information model(CIM)base[S].
  • 10王明俊 傅书逖.面向对象设计的开放式能量管理系[M].北京:中国电力出版社,1999..

引证文献4

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部