Journal of Xidian University ›› 2021, Vol. 48 ›› Issue (1): 133-140.doi: 10.19665/j.issn1001-2400.2021.01.015
Previous Articles Next Articles
FAN Meiyue(),DONG Qingkuan(),WANG Lei(),YANG Can()
Received:
2020-12-18
Online:
2021-02-20
Published:
2021-02-03
Contact:
Qingkuan DONG
E-mail:15122310778@163.com;qkdong@mail.xidian.edu.cn;240369410@qq.com;16638390848@163.com
CLC Number:
FAN Meiyue,DONG Qingkuan,WANG Lei,YANG Can. TTP-free weighted muti-owner RFID tag authentication protocol[J].Journal of Xidian University, 2021, 48(1): 133-140.
[1] | PRABHU B S, SU X, RAMAMURTHE H, et al. WinRFID:a Middleware for the Enablement of Radio Frequency Identification (RFID) Based Applications[M]. New York:John Wiley & Sons,Inc, 2005: 331-336. |
[2] | SRIVASTAVA K, AWASTHI A K, KAUL S D, et al. A Hash Based Mutual RFID Tag Authentication Protocolin Telecare Medicine Information System[J]. Journal of Medical Systems, 2015,39(1):1-5. |
[3] | 童嘉庆, 董庆宽, 霍伟光. 基于云数据库的低成本RFID认证协议[J]. 密码学报, 2015,2(4):333-341. |
TONG Jiaqing, DONG Qingkuan, HUO Weiguang. RFID Authentication Protocol Based on Cloud Database[J]. Journal of Cryptologic Research, 2015,2(4):333-341. | |
[4] | CHIEN H Y, CHEN C H. Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards[J]. Computer Standards and Interfaces, 2007,29(2):254-259. |
[5] | TAN C C, SHENG B, LI Q. Secure and Serverless RFID Authentication and Search Protocols[J]. IEEE Transactions on Wireless Communications, 2008,7(3):1400-1407. |
[6] | XIE W, XIE L, ZHANG C, et al. Cloud-based RFID Authentication [C]//Proceedings of the 2013 IEEE International Conference on RFID.Piscataway:IEEE, 2013: 168-175. |
[7] | 柳毅, 陈添笑, 洪洲. 抗同步化攻击的轻量级RFID双向认证协议[J]. 计算机应用研究, 2020,37(4):1136-1139. |
LIU Yi, CHEN Tianxiao, HONG Zhou. Lightweight RFID Mutual Authentication Protocol with Anti-synchronization Attack[J]. ApplicationResearch of Computers, 2020,37(4):1136-1139. | |
[8] | 甘勇, 杨宗琴, 贺蕾, 等. 带权重的多所有者标签所有权动态转换协议[J]. 网络与信息安全学报, 2017,3(4):14-19. |
GAN Yong, YANG Zongqin, HE Lei, et al. Tag Dynamic Ownership Transfer Protocol for Multi-owner with Weights[J]. Chinese Journal of Network and Information Security, 2017,3(4):14-19. | |
[9] | 甘勇, 王凯, 贺蕾, 等. 基于拉格朗日带TTP权重的多所有者标签所有权转换协议[J]. 网络安全技术与应用, 2017,( 12):36-38. |
GAN Yong, WANG Kai, HE Lei, et al. Tag Ownership Transfer Protocol of Multi-owner with TTP Weight Based on Lagrange[J]. Network Security Technology & Application, 2017,( 12):36-38. | |
[10] | 甘勇, 王凯, 贺蕾. 带TTP权重的多所有者RFID标签所有权动态转换协议[J]. 轻工学报, 2018,33(1):72-78. |
GAN Yong, WANG Kai, HE Lei. RFID Tag Dynamic Ownership Transfer Protocol of Multi-owner with TTP Weight[J]. Journal of Light Industry, 2018,33(1):72-78. | |
[11] | 甘勇, 王凯, 贺蕾. 带TTP的多所有者内部权重变化所有权转换协议[J]. 计算机科学, 2019,46(6A):370-374. |
GAN Yong, WANG Kai, HE Lei. Ownership Transfer Protocol for Multi-owners Internal Weight Changes with Trusted Third Party[J]. Computer Science, 2019,46(6A):370-374. | |
[12] | 彭勃. 基于云存储的RFID标签所有权动态转移协议[D]. 西安:西安电子科技大学, 2019. |
[13] | KAPOOR G, ZHOU W, PIRAMUTHU S. Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains[J]. Decision Support Systems, 2011,52(1):258-270. |
[14] | SUNDARESAN S, DOSS R, ZHOU W. Secure Ownership Transfer in Multi-tag/multi-owner Passive RFID Systems [C]//Proceedings of the 2013 IEEE Global Telecommunications Conference.Piscataway:IEEE, 2013: 2891-2896. |
[15] | SUNDARESAN S, DOSS R, ZHOU W, et al. Secure Ownership Transfer for Multi-tag Multi-owner Passive RFID Environment with Individual-owner-privacy[J]. Computer Communications, 2015,55:112-124. |
[16] | ZHU D, RONG W, WU D, et al. Lightweight Anonymous RFID Group Ownership Transfer Protocol in Multi-owner Environment [C]//Proceedings of the 2017 IEEE 19th Intl Conference on High Performance Computing and Communications.Piscataway:IEEE, 2017: 404-411. |
[17] | SHAMIR A. How to Share A Secret[J]. Communications of the ACM, 1979,22(11):612-613. |
[18] | CAI Q, ZHAN Y, WANG Y. A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis [C]// Proceedings of the 2008 ISECS International Colloquium on Computing,Communication,Control,and Management.Washington:IEEE Computer Society, 2008: 449-453. |
[19] | ABUGHAZALAH S, MARKANTONAKIS K, MAYES K. Secure Improved Cloud-based RFID Authentication Protocol [C]// Lecture Notes in Computer Science:8872.Heidelberg:Springer Verlag, 2015: 147-164. |
[20] | DONG Q K, TONG J Q, CHEN Y. Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud[J]. International Journal of Distributed Sensor Networks, 2015,2015:937198. |
[21] | GUO J, PEYRIN T, POSCHMANN A. The PHOTON Family of Lightweight Hash Functions [C]//Lecture Notes in Computer Science:6841.Heidelberg:SpringerVerlag, 2011: 222-239. |
[22] | 李璐璐. 基于云的轻量级RFID群组认证和所有权转移协议研究[D]. 西安:西安电子科技大学, 2018. |
[1] | CHEN Lei;SHI Xiaowei;YU Jianfeng;CHEN Yang. Design of a retrodirective array for RFID application [J]. J4, 2014, 41(6): 71-75. |
[2] | XIAO Hong;WANG Hong;MA Runnian;CUI Jie. Provably secure threshold FFS signature scheme in the random oracle model [J]. J4, 2011, 38(6): 130-133+151. |
[3] | LIU Weifeng;ZHUANG Yiqi;ZHOU Junchao;TANG Longfei;JIN Zhao. Clock generator with high stability for the UHF RFID chip [J]. J4, 2011, 38(4): 71-76. |
[4] |
LI Hui-xian1;CAI Wan-dong1;PEI Qing-qi2.
Design and analysis of a verifiable secret sharing scheme [J]. J4, 2008, 35(1): 148-151. |
[5] | SHEN Ting;LI Hui;YU Ming-zhe. Token-based single sign-on protocol and its formal analysis [J]. J4, 2006, 33(5): 792-796. |
[6] |
PANG Liao-jun;ZHAN Yang;WANG Yu-min.
Threshold secret sharing scheme based on ECC and its security [J]. J4, 2006, 33(4): 572-575. |
[7] |
WANG Hong(1);XIAO Hong(2);QIU Gang(2);FENG Deng-guo(1).
Secure distributed generation of the product of shared secrets [J]. J4, 2006, 33(1): 156-159. |
[8] |
PANG Liao-jun;WANG Yu-min.
A (t,n) secret sharing scheme based on the LUC cryptosystem |
[9] |
XU Chun-xiang1;2;NIU Zhi-hua1;XIAO Guo-zhen1.
A vector space secret sharingmultisignature scheme without a trusted share distribution center |
[10] |
SHI Ting-jun1;2;WANG Chao1;MA Jian-feng1.
Dynamic analysis and evaluation of the security of a proactive secret sharing system [J]. J4, 2004, 31(6): 905-909. |
[11] |
MA Wen-ping;REN Ya-an.
A new generalized colour visual cryptography scheme [J]. J4, 2004, 31(4): 581-584. |
[12] |
GUO Yuan-bo1;2;MA Jian-feng1.
An intrusion-tolerant conference key distribution scheme [J]. J4, 2004, 31(2): 260-263. |
[13] |
MA Wen-ping;REN Ya-an.
Colour secret sharing scheme for general access structures [J]. J4, 2004, 31(2): 252-254. |
[14] |
HE Ye-feng;ZHANG Jian-zhong.
A dynamic secret sharing scheme to identify cheaters [J]. J4, 2004, 31(1): 153-155. |
[15] |
XU Chun-xiang;FU Xiao-tong;XIAO Guo-zhen.
A secret sharing RSA digital signature scheme based on the vector space access structure [J]. J4, 2004, 31(1): 25-275. |
|