CN102043973B - RFID ownership transfer method based on partially trusted centre - Google Patents

RFID ownership transfer method based on partially trusted centre Download PDF

Info

Publication number
CN102043973B
CN102043973B CN2010105863413A CN201010586341A CN102043973B CN 102043973 B CN102043973 B CN 102043973B CN 2010105863413 A CN2010105863413 A CN 2010105863413A CN 201010586341 A CN201010586341 A CN 201010586341A CN 102043973 B CN102043973 B CN 102043973B
Authority
CN
China
Prior art keywords
write line
read write
new
key
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2010105863413A
Other languages
Chinese (zh)
Other versions
CN102043973A (en
Inventor
汪维家
李勇
刘云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jiaotong University
Original Assignee
Beijing Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jiaotong University filed Critical Beijing Jiaotong University
Priority to CN2010105863413A priority Critical patent/CN102043973B/en
Publication of CN102043973A publication Critical patent/CN102043973A/en
Application granted granted Critical
Publication of CN102043973B publication Critical patent/CN102043973B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention relates to a radio frequency identification technology, and discloses a RFID ownership transfer method based on a partially trusted centre, comprising the following steps: 1) a initial state step that the RFID respectively shares different secret keys with a reader-writer and the partially trusted centre; 2) a reader-writer secret key transmission step that an original owner reader-writer transmits the secret key to a new owner reader-writer; 3) a step of requesting a trusted centre, wherein the new owner reader-writer transmits a secret key updating request to the trusted centre; 4) a trusted centre responding step that the trusted centre transmits a permit to the new owner reader-writer; 5) a step of transmitting the secret key updating request to the RFID, wherein the new owner reader-writer transmits the updating request to the RFID; 6) a step of responding to the updating by the RFID, wherein the RFID updates the secret key and transmits an authentication code; and 7) a step of generating a new secret key by the new owner reader-writer, wherein the new owner reader-writer updates the secret key and transmits a piece of acknowledgment message. Compared with the prior RFID ownership transfer method, the method of the invention greatly enhances privacy protection for the new owner of the RFID, and can effectively various prior attacks.

Description

A kind of electronic tag ownership transfer method based on half trusted party
Technical field
The present invention relates to REID, particularly the relevant safety technique of RFID tag authentication.
Background technology
RF identification (Radio Frequency Identification is called for short " RFID ") technology is claimed electronic label technology again, is a kind of communication technology, can discern specific objective and read and write related data through radio signals.One of advantage of this technology is to need not to set up physics or other any visible contacting between recognition system and the specific objective.It is the unify contact tie of real world of department of computer science, for computing machine perception and identification real world provide a kind of efficient, inexpensive mode.
Rfid system is widely used, and can be used for retail supermarket, E-Passport, electronics banknote, personal identity card, digital library's management, even can be used for making up intelligent self-organizing network environment, or the like.Retail giant Wal-Mart, mechanisms such as U.S. Department of Defense have all adopted the RFID technology to discern and have followed the trail of the article that circulate in their product supply chain automatically.
Rfid system is made up of electronic tag (Tag) and read write line (Reader) usually.Electronic tag (also being called for short " label ") is the microcircuit that has antenna, does not have processor usually, only is made up of thousands of logic gates.Store the electronic data of certain format in the electronic tag, with this sign property information as article to be identified.In the application with electronic tag attached on the article to be identified, as the electronic marker of article to be identified.Read write line is the wireless transmit and the receiving equipment that have antenna, is responsible for the information in the electronic tag is read and write.In order to discern electronic tag, read write line connects a background data base (Back-end database is called for short " DB ") usually.Background data base is the Database Systems that run on hardware platform, it has been generally acknowledged that it has powerful calculating and storage capacity, and it comprises the information of all electronic tags in the system simultaneously.In recent years, along with developing rapidly of hardware technology, some read write line has possessed the hardware capabilities of toy data base in service, can independently retrieve and discern electronic tag.
Interactive communication between electronic tag and the read write line is open, therefore it has been generally acknowledged that the channel between label and the read write line is pregnable, and is unsafe.Read write line and background data base can be one on the hardware, also connect through symmetry or asymmetric cryptosystem safety, therefore, it has been generally acknowledged that the channel between them is safe.Thus, in the design of rfid system secure communication protocols, can think that read write line and background data base are one (promptly integral body are regarded the side in the communications protocol as, and the opposing party is an electronic tag).Therefore, in the present invention, we refer to " read write line and background data base " with " read write line ".Whole rfid system is as shown in Figure 1.
In rfid system, identification is typical " request-response " mode, and basic model is as shown in Figure 2.Read write line at first sends the identification request to electronic tag; Electronic tag returns the identification response message then, such as label ID and product information etc.
Increase along with what use, rfid system has been proposed very high demand for security, promptly protecting the privacy information of user by authentication the time is not one of them important demand for security by leakage.But in sweep limit, the read write line of malice can move the verification process of forging and survey the sensitive information of label to obtain writing down in the label.If there is not secret protection, label owner's identity and other sensitive information can discerned and write down to read write line through the sequence number that label sends arbitrarily.Therefore, the rfid system of a safety must satisfy following two demands.On the one hand, legal read write line must successfully be discerned legal label; On the other hand, illegal read write line can not obtain any privacy information from label.
Label has (Tag Ownership) and is meant and can discerns electronic tag and can control all relevant informations, also is that the article that this electronic tag is adhered to have ownership simultaneously.The electronic tag ownership shifts and is meant that a read write line shifts it to another read write line to some or certain some electronic tag ownership.The ownership of an electronic tag might constantly change in the cycle in serviceable life of this label.For example: initial electronics is signed and is attached on the product of being produced by the manufacturer, then encloses the product of label and is transferred to the retailer, and the ultimate consumer buys the product with label there from the retailer.The transfer of an electronic tag ownership means that the mandate of discerning this label shifted.Therefore the electronic tag ownership shifts and must guarantee: in case ownership shifts to the opposing party, the former side of having again can not discern this label.It is rfid system secret protection the very corn of a subject that the label ownership shifts.Suppose that user A has bought the article with electronic tag from the supermarket.The desired result that this transaction obtains should be: user A can pass through the label on his the handhold read-write device identify objects, and the read write line in supermarket can not trace into this label again.In case obtain all necessary informations of control label, newly the read write line of the side of having has just substituted former owner's read write line.With forward direction trackability not, because former owner is still keeping all secret informations on the label,
As far as we know, two types of RFID label ownership transfer systems are arranged at present.One type is that read write line directly shifts.In this type systematic; If user A has bought article that adhere to electronic tag, the label ownership transfer process of these article is following: the former owner's of above-mentioned label (i.e. the former owner of these commodity) read write line sends to the read write line that user A is held with all information of label through safe lane.Thus, user A can be through this label of read write line identification that he held.The advantage of this type systematic is that the ownership transfer process is simple, and efficient is high.But shortcoming is also very obvious: the former owner of label is still grasping all information of label, and the label that still can the recognition and tracking ownership have shifted is even the secret information that identification label is used can be brought in constant renewal in.This is because new and old owner grasps identical secret information and label about label and carries out on overt channel with communicating by letter of read write line.Therefore, can't protect the new owner's of label privacy in this type RIFD system.
The another kind of trusted party (Trusted Center is called for short " TC ") that is based on.In general, trusted party has two kinds, and a kind of is believable fully, and the whole behaviors in promptly credible center are all carried out according to the system protocol rule honestly; Another kind is partly believable; Be that credible center is fully honestly according to system protocol rule executive routine; But it is again curious simultaneously, collects the privacy information about some or some label through execution of participation system agreement or monitoring overt channel often, but never implements active attack.This trusted party is more near practical application.Existing label ownership transfer system based on trusted party all is based on complete believable trusted party.The used secret information of identification label is not directly to be stored on the read write line, but exists in the database of third party's trusted party.In this type systematic, the label ownership shifts under trusted party control and carries out.According to the label secret information of grasping; Trusted party upgrades the secret information in the target labels through the read write line that new owner held; And send corresponding secret information through safe lane and give the read write line that new owner held; So new owner is ability recognition objective label just, and the former owner of label can't this label of Tracking Recognition.This type systematic can effectively be protected the new owner's of label privacy, but its shortcoming also clearly: the trusted party that places one's entire reliance upon, trusted party must be believable fully, and this is difficult to realize in practical application.In addition, in this system, in fact the ownership of label does not change, all in trusted party control hand.
In order to address the above problem, we provide a kind of electronic tag ownership transfer system based on half trusted party.This system has overcome the shortcoming of above-mentioned two types of RIFD ownership transfer systems preferably.
Summary of the invention
In view of this, fundamental purpose of the present invention is to provide, a kind of electronic tag ownership transfer method based on half trusted party.Major advantage among the present invention is: one, realized the transfer of electronic tag ownership in the rfid system effectively; And the new owner's of protection label privacy is not revealed; Promptly guarantee the label ownership in case shift, the former owner of this label is this label of recognition and tracking again; Two, it is believable fully no longer requiring trusted party, can be partly believable, and more near practical application.Three, can cooperate with all kinds of tag recognition (comprising) based on fixed key or based on key updating; Four, can resist existing all known attacks of rfid system.
For reaching These characteristics, the invention provides a kind of electronic tag ownership transfer method based on half trusted party.Comprise following steps:
1) original state step; Former owner's read write line and target labels are shared a key; Trusted party and target labels are shared another key, and have the target labels ownership certificate that is presented to former owner, between the read write line and between read write line and the trusted party safe lane are arranged;
2) read write line key delivery step, former owner's read write line are utilized target labels ownership certificate that safe lane issues trusted party, are sent to new owner's read write line with some relevant informations of target labels cipher key shared and target labels;
3) request trusted party step after the message that new owner's read write line sends over former owner's read write line is deciphered and authentication passes through, utilizes safe lane that the message of above-mentioned deciphering is sent to trusted party with some relevant informations;
4) trusted party response of step; After the message that trusted party sends over new owner's read write line is deciphered and authentication passes through; Utilize with the target labels cipher key shared and generate key updating certificate and new key seed, utilize safe lane that above-mentioned key updating certificate, new key seed and some relevant informations are sent to new owner's read write line then;
5) send the key refresh request step to label; Trusted party is sended over after message is deciphered and authentication passes through; New owner's read write line to key updating certificate and some associated information calculation hash function values as authentication code; Send the key updating request to target labels then, and simultaneously above-mentioned authentication code and the above-mentioned relevant information that generates authentication code are sent label;
6) label response step of updating; After receiving above-mentioned authentication code and relevant information; The same utilization with the trusted party cipher key shared of target labels generates above-mentioned key updating certificate and new key seed; Utilize key updating certificate and the above-mentioned relevant information of receiving to come the authentication verification sign indicating number then,, then utilize new key seed and hash function to generate new key and new authentication code if authentication is passed through; And will be updated to the new key of above-mentioned generation with the read write line cipher key shared, subsequently new authentication code is sent to new owner's read write line;
7) new owner's read write line generates the new key step; Receive new authentication code from label; New owner's read write line utilizes the new key seed to verify, if pass through, then new key seed and hash function generate new key; And with this key as with the target labels cipher key shared, send confirmation to former owner's read write line at last.
In said method, said hash function is the hash function on the cryptography meaning.
In said method, said relevant information comprises: the sign of electronic tag, the random number of read write line information and required generation when implementing one-time pad etc.
In said method, said safe lane is based on symmetry or asymmetric cryptosystem.
Through finding that relatively the key distinction of technical scheme of the present invention and prior art is that the present invention has realized that effectively the electronic tag ownership shifts in the rfid system under the prerequisite of the new owner's privacy information of protection label; The safety hypothesis of foundation reduces, and trusted party is half believable getting final product, and the scope of application is wider; Compatible strong, can resist existing all known attacks of rfid system.
Description of drawings
Fig. 1 is a RFID existing system synoptic diagram.
Fig. 2 is a RFID existing system authentication protocol synoptic diagram.
Fig. 3 is an electronic tag ownership transfer process synoptic diagram among the present invention.
Embodiment
For making the object of the invention, technical scheme and advantage clearer, 3 couples of the present invention do further detailed description below in conjunction with accompanying drawing.
If two read write line A and B are arranged in the rfid system.TC is third-party trusted party, and T is the current goal electronic tag.En PK(M) for message M is encrypted with PKI PK, Dec SK(M) for ciphertext M is deciphered with private key SK, Sig SK(M) for private key SK message M is signed, the signature of generation comprises the signature value of message M and M, Ver PK(M) for signature M being verified with PKI PK.PK A, PK BAnd PK TCBe respectively the PKI of Reader A, Reader B and TC, SK A, SK BAnd SK TCBe respectively the private key of Reader A, Reader B and TC.ID is the identification number of electronic tag T, comprises some information relevant with label.H is the hash function on the cryptography meaning
Figure BDA0000037749440000071
L wherein rSecurity parameter for rfid system.The purpose of agreement is: under the assistance of TC, read write line A shifts the B to Reader with it to the ownership of label T safely.
(1) under the original state, trusted party TC and target labels T cipher key shared are K 0, the record about T (ID, A, a K are arranged in the database of TC accordingly 0).Read write line A and label T share I D and current key are K 1Simultaneously, also have among the A TC be presented to it about having certificate H (ID, the K of label T 0, A).
(2) in the 1st step of agreement, A calculates
Figure BDA0000037749440000072
N wherein ABe the random number that A generates, then with M 0Send to B.
(3) in the 2nd step of agreement, B receives M 0After, calculate If pass through, then calculate
Figure BDA0000037749440000074
N wherein BBe the random number that B generates, then with M 1Send to TC.Otherwise, return and report an error.
(4) in the 3rd step of agreement, TC receives M 1After, calculate
Figure BDA0000037749440000075
If pass through, then calculate
Figure BDA0000037749440000076
N wherein TCBe the random number that TC generates, then with in the database about record (ID, A, the K of T 0) be updated to (ID, B, K 0), and with M 2Send to B.Otherwise, return and report an error.
(5) in the 4th step of agreement, B receives M 2After, calculate
Figure BDA0000037749440000077
If pass through, then with H (K 0, ID, N A, N B, N TC), N A, N BAnd N TCSend to label T together.Otherwise, return and report an error.
(6) the 5th step of agreement, after T receives the message from B, checking H (K 0, ID, N A, N B, N TC) value, if pass through, then calculate authentication message M 3=H (H (K 0, ID, B, N B), N A, N TC, K 1, 0) and upgrade key K 1=H (H (K 0, ID, B, N B), N A, N TC, K 1, 1), then with M 3Send to B.Otherwise, return and report an error.
(7) in the 6th step of agreement, B receives M 3If the back checking is through then calculating M 4=H (K 1, " OK ") and calculating K 1=H (H (K 0, ID, B, N B), N A, N TC, K 1, 1).Then with M 4Send to A.Otherwise, return and report an error.
Though through reference certain preferred embodiment of the present invention; The present invention is illustrated and describes; But those skilled in the art should be understood that; Can do various changes to it in form and details, for example: between the read write line and the safe lane between read write line and the trusted party also can be based upon on the DSE arithmetic or the like, and without departing from the spirit and scope of the present invention.

Claims (3)

1. electronic tag ownership transfer system based on half trusted party may further comprise the steps:
1) original state step; Former owner's read write line and target labels are shared a key; Trusted party and target labels are shared another key, and have the target labels ownership certificate that is presented to former owner, between the read write line and between read write line and the trusted party safe lane are arranged;
2) read write line key delivery step, former owner's read write line are utilized target labels ownership certificate that safe lane issues trusted party, are sent to new owner's read write line with some information of target labels cipher key shared and target labels;
3) request trusted party step after the message that new owner's read write line sends over former owner's read write line is deciphered and authentication passes through, utilizes safe lane that the message of above-mentioned deciphering is sent to trusted party with some information;
4) trusted party response of step; After the message that trusted party sends over new owner's read write line is deciphered and authentication passes through; Utilize with the target labels cipher key shared and generate key updating certificate and new key seed, utilize safe lane that above-mentioned key updating certificate, new key seed and some information are sent to new owner's read write line then;
5) send the key refresh request step to label; Trusted party is sended over after message is deciphered and authentication passes through; New owner's read write line to key updating certificate and some information calculations hash function values as authentication code; Send the key updating request to target labels then, and simultaneously above-mentioned authentication code and the above-mentioned information that generates authentication code are sent label;
6) label response step of updating; After receiving above-mentioned authentication code and information; The same utilization with the trusted party cipher key shared of target labels generates above-mentioned key updating certificate and new key seed; Utilize key updating certificate and the above-mentioned information of receiving to come the authentication verification sign indicating number then,, then utilize new key seed and hash function to generate new key and new authentication code if authentication is passed through; And will be updated to the new key of above-mentioned generation with the read write line cipher key shared, subsequently new authentication code is sent to new owner's read write line;
7) new owner's read write line generates the new key step; Receive new authentication code from label; New owner's read write line utilizes the new key seed to verify, if pass through, then new key seed and hash function generate new key; And with this key as with the target labels cipher key shared, send confirmation to former owner's read write line at last.
2. in the system of claim 1, it is characterized in that said hash function is to use the hash function on the cryptography meaning, said safe lane is based on symmetry or asymmetric cryptosystem.
3. in the system of claim 1, it is characterized in that comprising: the sign of electronic tag, the random number of required generation when read write line information and enforcement one-time pad in said relevant information.
CN2010105863413A 2010-12-13 2010-12-13 RFID ownership transfer method based on partially trusted centre Expired - Fee Related CN102043973B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105863413A CN102043973B (en) 2010-12-13 2010-12-13 RFID ownership transfer method based on partially trusted centre

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105863413A CN102043973B (en) 2010-12-13 2010-12-13 RFID ownership transfer method based on partially trusted centre

Publications (2)

Publication Number Publication Date
CN102043973A CN102043973A (en) 2011-05-04
CN102043973B true CN102043973B (en) 2012-10-31

Family

ID=43910096

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105863413A Expired - Fee Related CN102043973B (en) 2010-12-13 2010-12-13 RFID ownership transfer method based on partially trusted centre

Country Status (1)

Country Link
CN (1) CN102043973B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102855504B (en) * 2011-08-02 2015-11-25 深联致远(北京)科技有限公司 RFID label tag ownership transfer method and device thereof
CN103281194B (en) * 2013-06-15 2018-12-28 杨涛 A kind of safety and lightweight RFID ownership transfer method based on Bilinear map
CN105681041B (en) * 2014-11-18 2019-09-17 航天信息股份有限公司 A kind of RFID ownership transfer method
TWI488607B (en) * 2014-11-21 2015-06-21 Physiological detection management system, physiological detection methods and the implementation of the method of computer software program
CN105812130B (en) * 2014-12-31 2020-01-24 航天信息股份有限公司 RFID ownership transfer method
CN105046462A (en) * 2015-06-17 2015-11-11 清华大学 Article safety circulation, anti-counterfeit authentication, and tracking and tracing method and system
EP3253021A1 (en) * 2016-06-03 2017-12-06 Gemalto Sa A method for managing the status of a connected device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008090424A (en) * 2006-09-29 2008-04-17 Sony Corp Management system, management method, electronic appliance and program
CN101222325A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network key management method based on ID
TW200941993A (en) * 2008-03-31 2009-10-01 Univ Chaoyang Technology A RFID systems conformation to EPC class 1 generation 2 standards ownership transfer scheme

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008090424A (en) * 2006-09-29 2008-04-17 Sony Corp Management system, management method, electronic appliance and program
CN101222325A (en) * 2008-01-23 2008-07-16 西安西电捷通无线网络通信有限公司 Wireless multi-hop network key management method based on ID
TW200941993A (en) * 2008-03-31 2009-10-01 Univ Chaoyang Technology A RFID systems conformation to EPC class 1 generation 2 standards ownership transfer scheme

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
安隐.使用RFID的安全威胁分析及技术解决对策.《金卡工程》.2007,(第9期),56-60. *

Also Published As

Publication number Publication date
CN102043973A (en) 2011-05-04

Similar Documents

Publication Publication Date Title
US8368516B2 (en) Secure data exchange with a transponder
CN102043973B (en) RFID ownership transfer method based on partially trusted centre
US10341341B2 (en) RFID authentication architecture and methods for RFID authentication
US9916483B1 (en) Tag-handle-based authentication of RFID readers
US10084597B1 (en) RFID tags with dynamic key replacement
US9773133B2 (en) RFID tag and reader characteristic determination using group keys
KR101404673B1 (en) System for authenticating radio frequency identification tag
US10713453B1 (en) Proxy-based reader authentication by trusted authority
CN103020671B (en) A kind of radio frequency identification mutual authentication method based on hash function
CN101847199B (en) Security authentication method for radio frequency recognition system
KR100805273B1 (en) Method and system for identfying information of product in display or in buy with radio frequency identification system and recording medium thereof
US9928390B1 (en) Network-enabled RFID tag endorsement
CN104885091A (en) RFID tag and method for operating RFID tag
US20080012690A1 (en) Transponder, RFID system, and method for RFID system with key management
CN103957186B (en) Method for effectively transferring label ownership in RFID system
CN114982197B (en) Authentication method, system and storage medium
CN110190965A (en) A kind of RFID cluster label authentication protocol based on hash function
US8866595B1 (en) Ticket-based RFID loss-prevention system
CN102682311A (en) Passive radio frequency identification (RFID) secutiry authentication method based on cyclic redundancy check (CRC) code operation
CN102594550A (en) RFID internal mutual authentication safety protocol based on secret key array
Munilla et al. Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
CN102693438A (en) Privacy protection radio frequency identification password protocol method and system
CN104506533A (en) RFID (radio frequency identification) label ownership transfer method based on PUF (physical unclonable function)
KR100734885B1 (en) Method for authenticating RFID tag and RFID server each other
Kim et al. MARP: Mobile agent for RFID privacy protection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20121031

Termination date: 20131213