CN107977696A - A kind of label ownership transfer method - Google Patents

A kind of label ownership transfer method Download PDF

Info

Publication number
CN107977696A
CN107977696A CN201711328185.9A CN201711328185A CN107977696A CN 107977696 A CN107977696 A CN 107977696A CN 201711328185 A CN201711328185 A CN 201711328185A CN 107977696 A CN107977696 A CN 107977696A
Authority
CN
China
Prior art keywords
label
rfid system
key
owner
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711328185.9A
Other languages
Chinese (zh)
Inventor
谢锐
刘道微
凌捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201711328185.9A priority Critical patent/CN107977696A/en
Publication of CN107977696A publication Critical patent/CN107977696A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0029Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device the arrangement being specially adapted for wireless interrogation of grouped or bundled articles tagged with wireless record carriers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/1607Details of the supervisory signal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of label ownership transfer method, the authentication between the label original owner and RFID system label is completed by quadratic residue theorem, the authentication between label new owner and RFID system label is completed by quadratic residue theorem, is realized by quadratic residue theorem to complete transfer of the label ownership between the label original owner and label new owner.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.

Description

A kind of label ownership transfer method
Technical field
The present invention relates to technical field of RFID, more specifically to a kind of label ownership transfer method.
Background technology
With the development of radio frequency identification (Radio Frequency Identification, RFID) technology, RFID Technology is widely used to the fields such as logistics management, identification, tracing, access control, in such applications, RFID skills The safety problem of label ownership transfer is increasingly paid attention in art.
In the transfer process of label ownership, the identity information and key information of label can be from the owners of current label New label owner is transferred to, so after ensureing label ownership transfer, label information that former label owner possesses To fail immediately, it is impossible to carry out legitimate authentication with label again, ensure unique validity of new label owner;And for new label Owner, it cannot be traceable to the related data of former owner after obtaining ownership according to existing label information, ensure that original possesses The secret privacy of person.
In conclusion how to provide a kind of safe label ownership transfer method be current those skilled in the art urgently Solve the problems, such as.
The content of the invention
The object of the present invention is to provide a kind of label ownership transfer method, it can solve how to provide to a certain extent A kind of technical problem of safe label ownership transfer method.
To achieve these goals, the present invention provides following technical solution:
A kind of label ownership transfer method, including:
The label original owner generates random number r1, sends authentication command and r1 to RFID system label;
The RFID system label generates random number r2, and based on quadratic residue theorem generate M1 corresponding with r1, r2, M2, M3 and M4, send M2, M3, M4 to the label original owner;
The label original owner verifies the true and false of the RFID system label based on M2, M3, M4, if vacation, then terminates Agreement;If true, then continue subsequent step;
M5, more new key key_old is calculated in the label original owner, sends M5 to the RFID system label;
The RFID system label verifies the true and false of the label original owner based on M5, if vacation, then termination protocol;If It is true, then continues subsequent step;
The RFID system tag update key key, and send ACK1 to the label original owner and determine message;
The label original owner initiates the request of label ownership transfer to label new owner;
The label new owner generates random number r3, based on the generation of quadratic residue theorem M6, M7 corresponding with r3, and to The RFID system label sends M6, M7;
The RFID system label verifies the true and false of the label new owner based on M6, M7, if vacation, then terminates association View, if true, then continues subsequent step;
R3, more new key t is calculated based on M6, M7 in the RFID system label, and is sent out to the label new owner ACK2 is sent to determine message;
The label new owner receives the ACK2 and determines message, to represent the success of label ownership transfer;
Wherein, M1, M2, M3, M4, M5, M6, M7 are the communication data in label ownership transfer.
Preferably, the RFID system label generation random number r2, and it is corresponding with r1, r2 based on the generation of quadratic residue theorem M1, M2, M3 and M4, including:
The RFID system label generation random number r2;
Key key between the RFID system label and the label original owner is decomposed into left and right two parts<key_ L、key_R>, M1 and M2 is calculated;
M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;
Wherein,M3=(M1 | | r1)2mod m; M4=(r2)2mod m。
Preferably, the label original owner verifies the true and false of the RFID system label based on M2, M3, M4, including:
The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtains Four roots of M1 and r2, the value of r2 is determined according to M1 and r1, wherein,
Judge whether Random is equal with M2, if equal, termination protocol, if unequal, the value of Random is determined For the value of M2, continue subsequent step;
Search the combination of legitimate tag, including tag identity mark ID, key, the RFID system label and the label Last round of key key_old between the former owner;
M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with the RFID The M2 that system label is sent is equal, if unequal, then it represents that the RFID system label is to forge, if equal, shows institute It is legal to state RFID system label.
Preferably, M5, more new key key_old is calculated in the label original owner, including:
M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;
Wherein,Key_old=key,
Preferably, the RFID system label verifies the true and false of the label original owner based on M5, including:
M5 is calculated based on ID, r2 and key_L that itself is stored in the RFID system label, judges that itself is calculated M5 whether with the label original owner send M5 it is identical, if identical, judge that the label original owner is legal, if Differ, then judge that the label original owner is illegal.
Preferably, the label new owner generates random number r3, based on quadratic residue theorem generate M6 corresponding with r3, M7, including:
The label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;
Wherein,T=(r3)2Mod m,
Preferably, the RFID system label verifies the true and false of the label new owner based on M6, M7, including:
The RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judges what itself was calculated Whether M6 and the M6 that the label new owner sends are identical, if differing, it is illegal to verify the label new owner, If identical, it is legal to verify the label new owner.
Preferably, r3, more new key t is calculated based on M6, M7 in the RFID system label, including:
R3 is calculated based on M6 and ID in the RFID system label, based on r3 and M7 more new key t;
Wherein,
A kind of label ownership transfer method provided by the invention, the label original owner is completed by quadratic residue theorem With the authentication between RFID system label, completed by quadratic residue theorem between label new owner and RFID system label Authentication, realize by quadratic residue theorem to complete label ownership in the label original owner and label new owner Between transfer.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is attached drawing needed in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of label ownership transfer method provided in an embodiment of the present invention;
Fig. 2 is a kind of transfer flow figure of label ownership transfer method provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the attached drawing in the embodiment of the present invention, the technical solution in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other without making creative work Embodiment, belongs to the scope of protection of the invention.
First the symbol applied during a kind of label ownership transfer provided in an embodiment of the present invention is illustrated:
T_old represents the label original owner;T_new represents label new owner;T represents RFID system label;ID is represented RFID system tag identity identifies;Key represents current shared key between RFID system label and the label original owner;key_old Represent last round of key between RFID system label and the label original owner;Key_L, key_R represent the left and right two of key key Point;T represents the shared key between RFID system label and label new owner;RFID system label is taken turns in Random expressions to produce Random number;R1 represents the random number of label original owner generation;R2 represents the random number of RFID system label generation;R3 is represented The random number of label new owner generation;M represents the product of two Big primes;M1、M2、M3、M4、M5、M6、M7、ACK1、ACK2 It is the communication data during label ownership transfer;⊕ represents XOR operation;& is represented and computing.
The symbol occurred in Fig. 2 is illustrated:
M3=(M1 | | r1)2mod m;
M4=(r2)2mod m;
T=(r3)2mod m。
Please refer to Fig.1 and Fig. 2, Fig. 1 are a kind of flow chart of label ownership transfer method provided in an embodiment of the present invention; Fig. 2 is a kind of transfer flow figure of label ownership transfer method provided in an embodiment of the present invention.
A kind of label ownership transfer method provided in an embodiment of the present invention, may comprise steps of:
Step S101:The label original owner generates random number r1, sends authentication command and r1 to RFID system label.
The label original owner mentioned here refers to the former owner of label ownership;Random number r1 mentioned here can To be that the label original owner generates by randomizer.The label original owner sends authentication command to RFID system label It is to prompt RFID system label to start to verify the true or false of the label original owner.
Step S102:RFID system label generates random number r2, and corresponding with r1, r2 based on the generation of quadratic residue theorem M1, M2, M3 and M4, send M2, M3, M4 to the label original owner.
Quadratic residue theorem brief introduction:If m is a very big composite number, x is remembered2≡ a (modm) divide exactly x for m2- a has solution, then A is referred to as the quadratic residue of mould m.Because m is very big, attacker is difficult to the explicit value for obtaining m, therefore can ensure that quadratic residue is encrypted The security of data;And for legitimate correspondence both sides, the factorization of m is the result is that mutually know, therefore can pass through solution Equation obtains the value of k b, ciphertext data.
Encryption based on quadratic residue theorem, decryption principle are as follows:
Public, private key generation:Two Big primes p, q are randomly selected, form 4k+3, i.e. p ≡ q ≡ 3mod4, calculate m=p* q.Wherein using m as public key, p, q are as private key;
Encryption:a≡x2(modm), a is returned;
Decryption:According to p, q, a decryption b, wherein C () represent Chinese remainder theorem:
b1=a(p+1)/4modp;b2=-(a(p+1)/4)modp;b3=a(q+1)/4modq;b4=-(a(q+1)/4)modq;
x1=C (b1,b3,p,q);x2=C (b1,b4,p,q);x3=C (b2,b3,p,q);x4=C (b2,b4,p,q);
X1, x2, x3, x4 are returned, it is different as a result, therefore in the application because can obtain four after decryption, it is also necessary to follow-up Calculate, so that it is determined that unique solution.In the present invention, quadratic residue theorem is combined with random number, can causes label ownership Tag identity mark ID redundancies in transfer process, so as to fast and effectively extract ciphertext, and are not easy by attacker Attack.
Step S103:The true and false of the label original owner based on M2, M3, M4 verification RFID system label, if vacation, then terminates Agreement;If true, then continue subsequent step.
During label ownership transfer, attacker's possible spoofing is into RFID system label, and from label, the original owner obtains Label information is taken, so the label original owner needs to verify the true and false of RFID system label, if true, then continues subsequent step, If vacation, then termination protocol.
Step S104:M5, more new key key_old is calculated in the label original owner, sends M5 to RFID system label.
The label original owner can calculate after verification RFID system label is very according to the label information that itself is preserved To M5, more new key key_old, and M5 is sent to RFID system label, so as to the RFID system label Verification label original owner The identity true and false.Here more new key key_old is that the identity between next secondary label original owner and RFID system label is tested Card is prepared.
Step S105:The true and false of the RFID system label based on the M5 verification label original owners, if vacation, then termination protocol; If true, then continue subsequent step.
In the transfer process of label ownership, attacker's possible spoofing is into the label original owner, from RFID system label Label information is obtained, so the true and false of the RFID system labeling requirement verification label original owner, if true, then continues follow-up step Suddenly, if vacation, then termination protocol.
Step S106:RFID system tag update key key, and send ACK1 to the label original owner and determine message.
RFID system label after the identity of the verification label original owner is very, can more new key key, it is and former to label The owner sends ACK1 and determines message.RFID system tag update key key be in order to prevent the label original owner in label institute Have the right after the completion of transfer, obtain label information from RFID system label again, namely in order to ensure the uniqueness of label ownership. RFID system label sends ACK1 to the label original owner and determines that message is to inform that the label original owner can be by label ownership It is transferred to label new owner.
Step S107:The label original owner initiates the request of label ownership transfer to label new owner.
The label original owner, can be to the new institute of label after the ACK1 confirmation messages of RFID system label transmission are received The person of having initiates the request of label ownership transfer.
Step S108:Label new owner generates random number r3, based on quadratic residue theorem generate M6 corresponding with r3, M7, and send M6, M7 to RFID system label.
Label new owner is after the label ownership transfer request of label original owner transmission is received, and just generation is random Number r3, and M6, M7 corresponding with r3 are generated based on quadratic residue theorem, and M6, M7 are sent to RFID system label, so as to RFID System label verifies the true or false of label new owner according to M6, M7.
Step S109:The true and false of the RFID system label based on M6, M7 verification label new owner, if vacation, then terminates association View, if true, then continues subsequent step.
During label ownership transfer, attacker's possible spoofing obtains label information into label new owner, so The true or false of label new owner is verified in RFID system labeling requirement, and if vacation, then termination protocol, if true, then continues follow-up Step.
Step S110:R3, more new key t is calculated based on M6, M7 in RFID system label, and is sent out to label new owner ACK2 is sent to determine message.
RFID system label, can be according to r3 more new key t, to ensure after the identity of verification label new owner is very Label ownership only returns label new owner, and sends ACK2 to label new owner and determine message.
Step S111:Label new owner receives ACK2 and determines message, to represent the success of label ownership transfer;
Wherein, M1, M2, M3, M4, M5, M6, M7 are the communication data in label ownership transfer.
Label new owner receive RFID system label transmission ACK2 determine message after, just represent label ownership into Work(is transferred to label new owner by the label original owner.
A kind of label ownership transfer method provided by the invention, the label original owner is completed by quadratic residue theorem With the authentication between RFID system label, completed by quadratic residue theorem between label new owner and RFID system label Authentication, realize by quadratic residue theorem to complete label ownership in the label original owner and label new owner Between transfer.Solves the technical problem how a kind of safe label ownership transfer method is provided to a certain extent.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label generates in step S102 Random number r2, and M1, M2, M3 and M4 corresponding with r1, r2 are generated based on quadratic residue theorem, it is specifically as follows:
RFID system label generation random number r2;
Key key between RFID system label and the label original owner is decomposed into left and right two parts<key_L、key_R>, M1 and M2 is calculated;
M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;
Wherein,M3=(M1 | | r1)2mod m; M4=(r2)2mod m。
The label original owner verifies the true or false of RFID system label, namely ID, key that verification RFID system label possesses Deng whether consistent with ID, key of itself preservation etc.;So RFID can combine quadratic residue theorem to owned ID, Key etc. is encrypted, and encrypted communication data is sent to the label original owner.
In a kind of label ownership transfer method provided in an embodiment of the present invention, the step S103 label original owners are based on M2, M3, M4 verify the true and false of RFID system label, are specifically as follows:
The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtain M1 and Four roots of r2, the value of r2 is determined according to M1 and r1, wherein, r2=ID ⊕ M1 ⊕ r1;
Judge whether Random is equal with M2, if equal, termination protocol, if unequal, the value of Random is determined For the value of M2, continue subsequent step;
Search the combination of legitimate tag, including tag identity mark ID, key, RFID system label and the label original owner Between last round of key key_old;
M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with RFID system The M2 that label is sent is equal, if unequal, then it represents that RFID system label is to forge, if equal, shows RFID system mark Label are legal.
Here it is to assign the value of M2 to Random the value of Random to be determined as the value of M2, is next secondary label original owner The true or false of verification RFID system label is prepared.
In a kind of label ownership transfer method provided in an embodiment of the present invention, the step S104 label original owners calculate To M5, more new key key_old, it is specifically as follows:
M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;
Wherein,Key_old=key,
The true and false of the RFID system label Verification label original owner, namely ID, key of the owner's preservation of verification label original etc. Whether information is consistent with the information such as ID, key that itself is preserved;So the label original owner can encrypt ID, key_L and r2 After be sent to RFID system label, and with new key key_old, prepare for verification next time.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S105 M5 verifies the true and false of the label original owner, is specifically as follows:
M5 is calculated based on ID, r2 and key_L that itself is stored in RFID system label, judges the M5 itself being calculated It is whether identical with the M5 that the label original owner sends, if identical, judge that the outgoing label original owner is legal, if differing, sentence The disconnected outgoing label original owner is illegal.
M5 can be calculated according to ID, r2 and key_old that itself is stored in verification process for simplicity, RFID system, Then judge whether the M5 itself being calculated is consistent with the M5 that the label original owner sends, if unanimously, the label original owner Legal, if inconsistent, the label original owner is illegal.
In a kind of label ownership transfer method provided in an embodiment of the present invention, step S108 labels new owner generation with Machine number r3, generates M6, M7 corresponding with r3 based on quadratic residue theorem, is specifically as follows:
Label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;
Wherein,T=(r3)2Mod m,
During label ownership transfer, ID can be transferred to label new owner by the label original owner, so label New owner can allow the RFID system label Verification true or false of itself by ID.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S109 M6, M7 verify the true and false of label new owner, are specifically as follows:
RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judge the M6 that itself is calculated with Whether the M6 that label new owner sends is identical, if differing, verification outgoing label new owner is illegal, if identical, tests It is legal to demonstrate,prove outgoing label new owner.
In order to facilitate verification, RFID system label first can decrypt r3 according to M6, M7, then further according to r3 and itself deposit M6 is calculated in the ID of storage, judges whether the M6 itself being calculated is consistent with the M6 that label new owner sends, if unanimously, Label new owner is legal, if inconsistent, label new owner is illegal.
In a kind of label ownership transfer method provided in an embodiment of the present invention, RFID system label is based in step S110 R3, more new key t is calculated in M6, M7, is specifically as follows:
R3 is calculated based on M6 and ID in RFID system label, based on r3 and M7 more new key t;
Wherein,
In order to ensure that label new owner possesses the uniqueness of label ownership, RFID system label is in the new institute of verification label , it is necessary to update label new owner and the key t between itself after the person of having is legal.
In above-mentioned technical proposal provided in an embodiment of the present invention with to correspond to technical solution realization principle in the prior art consistent Part and unspecified, in order to avoid excessively repeat.The foregoing description of the disclosed embodiments, enables those skilled in the art Enough realize or use the present invention.A variety of modifications to these embodiments will be apparent for a person skilled in the art, The general principles defined herein can be real in other embodiments without departing from the spirit or scope of the present invention It is existing.Therefore, the present invention is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein The most wide scope consistent with features of novelty.

Claims (8)

  1. A kind of 1. label ownership transfer method, it is characterised in that including:
    The label original owner generates random number r1, sends authentication command and r1 to RFID system label;
    The RFID system label generates random number r2, and generates M1, M2, M3 corresponding with r1, r2 based on quadratic residue theorem And M4, M2, M3, M4 are sent to the label original owner;
    The label original owner verifies the true and false of the RFID system label based on M2, M3, M4, if vacation, then termination protocol; If true, then continue subsequent step;
    M5, more new key key_old is calculated in the label original owner, sends M5 to the RFID system label;
    The RFID system label verifies the true and false of the label original owner based on M5, if vacation, then termination protocol;If Very, then subsequent step is continued;
    The RFID system tag update key key, and send ACK1 to the label original owner and determine message;
    The label original owner initiates the request of label ownership transfer to label new owner;
    The label new owner generates random number r3, and M6, M7 corresponding with r3 are generated based on quadratic residue theorem, and to described RFID system label sends M6, M7;
    The RFID system label verifies the true and false of the label new owner based on M6, M7, if vacation, then termination protocol, if It is true, then continues subsequent step;
    R3, more new key t is calculated based on M6, M7 in the RFID system label, and is sent to the label new owner ACK2 determines message;
    The label new owner receives the ACK2 and determines message, to represent the success of label ownership transfer;
    Wherein, M1, M2, M3, M4, M5, M6, M7, ACK1, ACK2 are the communication data in label ownership transfer.
  2. 2. according to the method described in claim 1, it is characterized in that, the RFID system label generates random number r2, and it is based on Quadratic residue theorem generates M1, M2, M3 and M4 corresponding with r1, r2, including:
    The RFID system label generation random number r2;
    Key key between the RFID system label and the label original owner is decomposed into left and right two parts<key_L、 key_R>, M1 and M2 is calculated;
    M1 and M2 are encrypted respectively based on quadratic residue theorem, obtain M3 and M4;
    Wherein,M3=(M1 | | r1)2mod m;M4= (r2)2mod m。
  3. 3. according to the method described in claim 2, it is characterized in that, the label original owner is based on described in M2, M3, M4 verification The true and false of RFID system label, including:
    The label original owner is decrypted M2, M3 and M4 that itself is received based on quadratic residue theorem, obtain M1 and Four roots of r2, the value of r2 is determined according to M1 and r1, wherein,
    Judge whether Random is equal with M2, if equal, termination protocol, if unequal, is determined as M2 by the value of Random Value, continue subsequent step;
    Search the combination of legitimate tag, including tag identity mark ID, key, the RFID system label and the label original institute Last round of key key_old between the person of having;
    M2 is calculated in the combination of legitimate tag based on lookup, judge the M2 that itself is calculated whether with the RFID system The M2 that label is sent is equal, if unequal, then it represents that the RFID system label is to forge, if equal, is shown described RFID system label is legal.
  4. 4. according to the method described in claim 3, it is characterized in that, M5, more new key is calculated in the label original owner Key_old, including:
    M5, more new key key_old is calculated based on ID, r2 and key_L that itself is stored in the label original owner;
    Wherein,Key_old=key,
  5. 5. according to the method described in claim 4, it is characterized in that, the RFID system label, which is based on M5, verifies that the label is former The true and false of the owner, including:
    M5 is calculated based on ID, r2 and key_L that itself is stored in the RFID system label, judges the M5 itself being calculated It is whether identical with the M5 that the label original owner sends, if identical, judge that the label original owner is legal, if not phase Together, then judge that the label original owner is illegal.
  6. 6. according to the method described in claim 5, it is characterized in that, the label new owner generates random number r3, based on two Secondary remainder theorem generates M6, M7 corresponding with r3, including:
    The label new owner generates random number r3, and M6, M7 corresponding with ID, r3 are generated based on quadratic residue theorem;
    Wherein,T=(r3)2Mod m,
  7. 7. according to the method described in claim 6, it is characterized in that, the RFID system label, which is based on M6, M7, verifies the mark The true and false of new owner is signed, including:
    The RFID system label decrypts r3 based on M6, M7, and M6 is calculated based on r3, judge the M6 that itself is calculated with Whether the M6 that the label new owner sends is identical, if differing, it is illegal to verify the label new owner, if phase Together, then it is legal to verify the label new owner.
  8. 8. the method according to the description of claim 7 is characterized in that r3 is calculated based on M6, M7 in the RFID system label, More new key t, including:
    R3 is calculated based on M6 and ID in the RFID system label, based on r3 and M7 more new key t;
    Wherein,
CN201711328185.9A 2017-12-13 2017-12-13 A kind of label ownership transfer method Pending CN107977696A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711328185.9A CN107977696A (en) 2017-12-13 2017-12-13 A kind of label ownership transfer method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711328185.9A CN107977696A (en) 2017-12-13 2017-12-13 A kind of label ownership transfer method

Publications (1)

Publication Number Publication Date
CN107977696A true CN107977696A (en) 2018-05-01

Family

ID=62010142

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711328185.9A Pending CN107977696A (en) 2017-12-13 2017-12-13 A kind of label ownership transfer method

Country Status (1)

Country Link
CN (1) CN107977696A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330457A (en) * 2016-08-19 2017-01-11 西安电子科技大学 Method for transferring ownership of radio frequency identification label based on quadratic residue
CN107086905A (en) * 2017-02-27 2017-08-22 广东工业大学 A kind of RFID tag group ownership transfer method based on quadratic residue theorem
CN107094073A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106330457A (en) * 2016-08-19 2017-01-11 西安电子科技大学 Method for transferring ownership of radio frequency identification label based on quadratic residue
CN107086905A (en) * 2017-02-27 2017-08-22 广东工业大学 A kind of RFID tag group ownership transfer method based on quadratic residue theorem
CN107094073A (en) * 2017-02-27 2017-08-25 广东工业大学 A kind of group's RFID tag ownership transfer method based on Chinese remainder theorem

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李晓东,徐金成: "基于二次剩余的RFID标签所有权动态转移协议", 《计算机应用研究》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302290A (en) * 2018-08-30 2019-02-01 仲恺农业工程学院 It is a kind of to be mutually authenticated protocol method with ownership transfer

Similar Documents

Publication Publication Date Title
CA2652084C (en) A method and apparatus to provide authentication and privacy with low complexity devices
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
Tan et al. Comments on “dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks”
JP6417036B2 (en) Entity authentication method and apparatus based on pre-shared key
CN110971415A (en) Space-ground integrated space information network anonymous access authentication method and system
CN110381055B (en) RFID system privacy protection authentication protocol method in medical supply chain
CN106209768B (en) A kind of expansible RFID mutual authentication method
CN108650028B (en) Multiple identity authentication system and method based on quantum communication network and true random number
CN109391468A (en) A kind of authentication method and system
CN105049401A (en) Secure communication method based on intelligent vehicle
CN113365270B (en) RFID multi-label joint authentication system and method based on application of Internet of things
JP2012527190A (en) System and method for securely identifying and authenticating a device in a symmetric encryption system
CN112351037B (en) Information processing method and device for secure communication
CN115348076B (en) Equipment security authentication method and system based on attribute encryption and related devices thereof
CN111277412A (en) Data security sharing system and method based on block chain key distribution
CN104868998A (en) System, Device, And Method Of Provisioning Cryptographic Data To Electronic Devices
CN102884756A (en) Communication device and communication method
Jannati et al. Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags
US20060253577A1 (en) Method, system and computer program for the secured management of network devices
EP1964303B1 (en) Verfahren und system zur authentifizierung eines beweisers mit geringen ressourcen
CN109766966B (en) RFID tag random number synchronous updating method
Pourpouneh et al. An improvement over a server-less rfid authentication protocol
CN107977696A (en) A kind of label ownership transfer method
CN108965266B (en) User-to-User identity authentication system and method based on group key pool and Kerberos
Shen et al. An Anti-counterfeit Complete RFID Tag Grouping Proof Generation Protocol.

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180501

RJ01 Rejection of invention patent application after publication