CN109711216A - A kind of anonymous group technology and authentication method of Verification System - Google Patents

A kind of anonymous group technology and authentication method of Verification System Download PDF

Info

Publication number
CN109711216A
CN109711216A CN201811549552.2A CN201811549552A CN109711216A CN 109711216 A CN109711216 A CN 109711216A CN 201811549552 A CN201811549552 A CN 201811549552A CN 109711216 A CN109711216 A CN 109711216A
Authority
CN
China
Prior art keywords
group
label
code key
anonymous
reader
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811549552.2A
Other languages
Chinese (zh)
Inventor
李智聪
周治平
王康
张敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangnan University
Original Assignee
Jiangnan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangnan University filed Critical Jiangnan University
Priority to CN201811549552.2A priority Critical patent/CN109711216A/en
Publication of CN109711216A publication Critical patent/CN109711216A/en
Pending legal-status Critical Current

Links

Landscapes

  • Medical Treatment And Welfare Office Work (AREA)

Abstract

The invention discloses a kind of anonymous group technologies of Verification System, include the following steps, label initializes, and the initialization operation includes the division and code key distribution of anonymous group, and code key distribution includes group code keyUnique code keyIdentification sets Ωi,jDistribution;According to the division of anonymity group and the corresponding generation reader code key of code key distribution.Beneficial effects of the present invention: the anonymous group technology and authentication method provided through the invention can be realized the quick identification of label, have secret protection and safety, and guarantee the harmony between privacy and scalability.

Description

A kind of anonymous group technology and authentication method of Verification System
Technical field
The present invention relates to the technical field of Internet of Things safety certification more particularly to a kind of anonymous group technologies of Verification System And authentication method.
Background technique
The use of medical information system can reduce medical malpractice, accelerate medical procedures, improve medical service level.So And present system is still unable to satisfy rapidity demand in emergency circumstances.The drawbacks of in order to make up medical information system, Researcher considers to further increase RFID technique applied to medical field information collection in medical treatment, patient's supervision, equipment management Etc. processes high efficiency.As the key technology of thing network sensing layer, RFID is wide with its contactless advantage quickly identified General application.The features such as due to the fragility of wireless transmission air interface and calculating and limited storage resource, RFID is to production Life also brings many privacy and safety problem while offering convenience.The bulkyness and patient information of medical system scale Sensibility, hinder RFID system its huge potentiality is played in medical treatment.Therefore, in the medical field, RFID authentication protocol Design should be improved while guaranteeing patient privacy system scalability and reduce system cost.
Researchers mostly use irreversible cryptographic primitives design verification agreement, and the safety and privacy for solving RFID technique are asked Topic, all label informations that these agreements need to store in search system go to realize the safety certification of target labels.With system The quantity of the increase of scale, label requirements increases, and the search cost for authenticating generation is also linearly increasing, will cause under system performance Drop.For the scalability for realizing system under extensive demand, part researcher designs the authentication protocol based on tree, may be implemented to mark The fast search of label, however all members must share code key ingredient, as label is presented by the increase system of corruption member High security risk.In addition, area protocol goes to realize safety certification using public-key cryptography scheme, though it improves to a certain extent Safety, but high cost caused by complicated cryptographic primitives and poor efficiency make it that can not be suitable for medical field.
Summary of the invention
The purpose of this section is to summarize some aspects of the embodiment of the present invention and briefly introduce some preferable implementations Example.It may do a little simplified or be omitted to avoid our department is made in this section and the description of the application and the title of the invention Point, the purpose of abstract of description and denomination of invention it is fuzzy, and this simplification or omit and cannot be used for limiting the scope of the invention.
In view of above-mentioned existing problem, the present invention is proposed.
Therefore, a purpose of the invention is to provide a kind of anonymous group technology of Verification System, can protect the same of privacy When, guarantee the harmony of scalability.
In order to solve the above technical problems, the invention provides the following technical scheme: a kind of anonymous group technology of Verification System, Include the following steps, label initializes, and the initialization operation includes the division and code key distribution of anonymous group, and institute Stating code key distribution includes group code keyUnique code keyIdentification sets Ωi,jDistribution;According to the division and code key point of anonymity group Hair is corresponding to generate reader code key.
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the anonymous group What is divided further includes that it is relevant will to be assigned itself an illness information when patient is medical for each anonymous group corresponding a kind of illness Wrist strap radio frequency identifies label, and same type of patient will be divided into the same anonymous group GiIt is interior.
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the code key distribution Further comprising the steps of, N number of label is divided into τ group in system, and every group possesses unique group keyThe group key is by group All labels are shared in group, while organizing GiIn each group membership TjIt is assigned a unique certification code keyEach set of tags GiIt is transported to a logo collection ξi={ IDi,1,IDi,2,...,IDi,M, intersection is not present in any different group identification sets, i.e.,GiIn each label possess the identical identification sets of mark quantity Ωi,jFor ξiSubset, there must be the mark shared with other members in the mark subset in label.
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the anonymous group Division further includes having N number of label in hypothesis system, and label is divided into τ group, each group of GiLabel number is
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the code key distribution Further include i-th group of label be Gi(i ∈ 1 ... τ }) it is the group code key of distribution oneTo GiGroup, the code key is by all in group Member is shared, and gives GiEach group membership TjDistribution one unique certification code key
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the code key distribution It further include identification sets Ωi,jDistribution comprising each set of tags sends a logo collection, GiThe logo collection of group label is ξi ={ IDi,1,IDi,2,...,IDi,M, wherein joining M number for system, intersection is not present in any different two groups identification sets, i.e.,And i, j ∈ 1 ... τ }.
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the code key distribution It further include the distribution of group member's sub-mark collection comprising GiIn each label possess identification setsEach element is different in set;Same mark Multiple labels may be organized together to share, i.e.,And p ≠ q.
A kind of preferred embodiment of anonymous group technology as Verification System of the present invention, in which: the reader is secret Key generation includes that manager distributes each group of secret information setTo reader, σiFor ξiMiddle mark The mappings of collectioni={ IDi,xx| 1≤x≤M }, wherein πxIt is to indicate and IDi,xAssociated label code key, i.e., in all labels In the sub-mark set of storage, include mark IDi,xLabel unique code key formed set, when any one label not Include IDi,xWhen πxFor empty set.
Another object of the present invention is the anonymous group technology based on above-mentioned Verification System, provides a kind of authentication method, energy It is enough to realize balanced secret protection and efficiency.
In order to solve the above technical problems, the invention provides the following technical scheme: a kind of authentication method, it is characterised in that: adopt With the anonymous group technology of above-mentioned Verification System, and it is further comprising the steps of, reader generates random number nr, and as request Message is sent to label;Label receives request message nrAfterwards, random number n is generatedt, from the sub-mark collection Ω of storagei,jSelect one Identify IDi,jx;It generatesAnd U, V are sent to reader.
A kind of preferred embodiment as authentication method of the present invention, in which: the certification further includes receiving message U, V Afterwards, reader retrieves all group code keysCiphertext U is decrypted, when in the plaintext solved include nr, then label institute is found Group, and extract IDi,jx;Reader traversal and IDi,jxRelevant all certification code key k ∈ πx, solve in ciphertext and include nt, and get corresponding certification code keyThen authenticating tag TjSuccess;Reader think label be it is legal, otherwise terminate Agreement.
Beneficial effects of the present invention: the anonymous group technology and authentication method provided through the invention can be realized The quick identification of label has secret protection and safety, and guarantees the harmony between privacy and scalability.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, required use in being described below to embodiment Attached drawing be briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill of field, without any creative labor, it can also be obtained according to these attached drawings other Attached drawing.Wherein:
Fig. 1 is the grouping schematic diagram of the anonymous group technology of Verification System of the present invention;
Fig. 2 is the identifying procedure schematic diagram of the authentication method of Verification System of the present invention.
Specific embodiment
In order to make the foregoing objectives, features and advantages of the present invention clearer and more comprehensible, right with reference to the accompanying drawings of the specification A specific embodiment of the invention is described in detail, it is clear that and described embodiment is a part of the embodiments of the present invention, and It is not all of embodiment.Based on the embodiments of the present invention, ordinary people in the field is without making creative work Every other embodiment obtained, all should belong to the range of protection of the invention.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, but the present invention can be with Implemented using other than the one described here other way, those skilled in the art can be without prejudice to intension of the present invention In the case of do similar popularization, therefore the present invention is not limited by the specific embodiments disclosed below.
Secondly, " one embodiment " or " embodiment " referred to herein, which refers to, may be included at least one realization side of the invention A particular feature, structure, or characteristic in formula." in one embodiment " that different places occur in the present specification not refers both to The same embodiment, nor the individual or selective embodiment mutually exclusive with other embodiments.
Combination schematic diagram of the present invention is described in detail, when describing the embodiments of the present invention, for purposes of illustration only, indicating device The sectional view of structure can disobey general proportion and make partial enlargement, and the schematic diagram is example, should not limit this herein Invent the range of protection.In addition, the three-dimensional space of length, width and depth should be included in actual fabrication.
Simultaneously in the description of the present invention, it should be noted that the orientation of the instructions such as " upper and lower, inner and outer " in term Or positional relationship is to be based on the orientation or positional relationship shown in the drawings, and is merely for convenience of description of the present invention and simplification of the description, and It is not that the device of indication or suggestion meaning or element must have a particular orientation, be constructed and operated in a specific orientation, therefore It is not considered as limiting the invention.In addition, term " first, second or third " is used for description purposes only, and cannot understand For indication or suggestion relative importance.
In the present invention unless otherwise clearly defined and limited, term " installation is connected, connection " shall be understood in a broad sense, example Such as: may be a fixed connection, be detachably connected or integral type connection;It equally can be mechanical connection, be electrically connected or be directly connected to, Can also indirectly connected through an intermediary, the connection being also possible to inside two elements.For the ordinary skill people of this field For member, the concrete meaning of above-mentioned term in the present invention can be understood with concrete condition.
Embodiment 1
Signal referring to Fig.1~2, in order to realize that Verification System can weigh security privacy and the system expandability, this reality The anonymous group technology that example proposes a kind of Verification System is applied, this method is applied in expansible RFID authentication protocol, it is made Suitable for medical system, and there is the harmony between good privacy and scalability.Wherein RFID, that is, radio frequency identification is one The contactless automatic identification technology of kind, it can rapidly carry out item tracing by radiofrequency signal automatic identification target object And data exchange, and identify that work without manual intervention, is operable with various adverse circumstances.RFID technique can recognize high-speed motion Object simultaneously can identify multiple labels simultaneously, swift and convenient to operate.During RFID technique is born in World War II, it is to pass The successor of system barcode technology, also known as " electronic tag " or " RF tag ".The present embodiment is based on anonymous group technology building Secret protection RFID rapid authentication agreement, which is suitable for medical field, realizes security privacy and the system expandability It is balanced.
Further, the Verification System of the present embodiment meaning, for example including application scenarios below: assuming that be each hospitalized Patient is sent the RFID electronic label of a wrist strap, preserves the essential information of some patients such as in electronic tag: identity letter Breath, drug allergy history etc. are additionally stored with the information for system authentication of initialization distribution.Medical staff distributes one and reads Device is read, the therapeutic state of the affiliated patient of label is obtained, for example whether take medicine, regular ward round etc. on time.In urgent feelings, can mark It signs in reading range under request label condition, is carried out even if obtaining the information such as medical history, the allergies of patient by acquisition authenticating tag Sue and labour.The Verification System relates generally to three entities, respectively manager, reader and label.Manager mainly initializes Each label, and be each group of transmission group code key and logo collection, furthermore manager also wants authorised reader to access label;And it reads It reads device and label is to realize two entities being mutually authenticated;The process of authentication protocol is broadly divided into two stages, initial phase And authentication phase;The participant of initial phase is manager, reader, label, and authentication phase only has reader and label ginseng With.
Based on the above-mentioned Verification System suitable for medical system, a kind of anonymous group technology is provided, and same by obscuring The mode of one anonymous group session mark, guarantees that the message generated in verification process has the unidentifiable property towards attacker, from And realize secret protection.The size divided by adjusting anonymous group, may be implemented the equilibrium between secret protection and scalability, In face of different scene demands, it is big that different anonymous groups is set;Such as under the relevant scene of patient, to increase privacy performance, The size that anonymous group should be improved can reduce the size of anonymous group in medical instrument management, improve rapidity;In addition, the association View can prevent the common security threats such as tracking attack, impersonation attack, Replay Attack.
Grouping refers to being grouped label, and the example of list illustrates the validity of grouping, and current each label only has One oneself name, has a name for identical group after grouping, you will look for a label, Ke Yixian in the case where doing so Group is found, then finds specific label, the time can be shortened.But simple this grouping, it can be dangerous.Attacker is easy to obtain Take the relevant some information of group, such as group code key (group interior label is shared, so easily leakage).Grouping of the invention is to attack The person of hitting gets a group code key, and safety.Be related to two kinds of defence policies: label each first stores a mark subset, Certification can randomly choose a mark from subset every time, in addition, there is a situation where to share between our mark subset, play One purpose obscured, even if attacker gets the mark, but he not can determine that it is that member in group.For label Grouping, reader will store relevant group information, all group code keys and each group of identification sets etc., belonging to label will store The group code key and mark subset of group, and identifying subset is selected from the identification sets that reader stores.
Further, which belongs to the initial phase of authentication protocol.Specifically, further including following step Suddenly, the operation that label is initialized by administrator including the division organized and carries out a group code keyUnique code keyIdentification sets Ωi,jDistribution;By each group of corresponding a kind of illness, itself an illness information will be assigned when patient is medical Relevant wrist strap RFID label tag, same type of patient will be divided into the same anonymous group GiIt is interior.
N number of label is divided into τ group in system, and every group possesses unique group keyThe group key is owned in group Label is shared, while organizing GiIn each group membership TjIt is assigned a unique certification code keyEach set of tags GiIt is transported to One logo collection ξi={ IDi,1,IDi,2,...,IDi,M, intersection is not present in any different group identification sets, i.e., GiIn each label possess the identical identification sets of mark quantityΩi,jFor ξiSon Collect, there must be the mark shared with other members in the mark subset in label.Manager distributes each group of secret information SetTo reader, σiFor ξiThe mappings of middle identification setsi={ IDi,xx| 1≤x≤M }, wherein πxIt is Expression and IDi,xAssociated label code key includes mark ID that is, in the sub-mark set of all labels storagei,xLabel Unique code key formed set, when any one label does not all include IDi,xWhen πxFor empty set.Therefore the stage is related to authenticating System initialization, manager have been substantially carried out the division of group and the distribution of the attribute data for certification.
For the anonymous group technology proposed in initial phase, more specifically, the division and system authentication of anonymity group The distribution of parameter the following steps are included:
The division of anonymity group: assuming that there is N number of label in system, label is divided into τ group, each group of label by manager Number isPreferable time complexity is able to maintain in this step: agreement can be realized the quick identification of label, it is assumed that The scale of label is N in system, in traditional authentication schemes, to traverse the record of all labels of verifying end storage, system is recognized Card complexity is o (N).In the method, the time complexity for first having to find the cost of corresponding group of needs of label is The division that the time complexity that corresponding label is spent depends on identification sets is found from group, it is assumed that current authentication label after division In xth group, it is assumed that some identifies corresponding πxMiddle code key number is that the time complexity that k then needs is o (k).Therefore, total to answer Miscellaneous degree isDue toAnd with the increase of N, this gap of increase for organizing scale be will increase, the group technology The time can effectively be shortened.
Code key distribution: i-th group of label is Gi(i ∈ 1 ... τ }) it is that manager distributes one group code keyTo GiGroup, The code key is organized interior all members and is shared.To GiEach group membership TjDistribution one unique certification code key
The distribution of logo collection: manager sends a logo collection, G to each set of tagsiThe logo collection of group label For ξi={ IDi,1,IDi,2,...,IDi,M, wherein joining M number for system, intersection is not present in any different two groups identification sets, i.e.,And i, j ∈ 1 ... τ }.
The distribution of group member's sub-mark collection: GiIn each label own an element the identical identification sets of quantityEach element is different in set.Same mark Multiple labels may be organized together to share, i.e.,And p ≠ q.It therefore can be by It is shared to depend on initial phase, if the mark is distributed to a group membership, if shared to have one for attacker Fixed uncertainty, by this thought obscured, it is unique that attacker, which can not determine that this is identified whether,.
Reader code key generates: manager distributes each group of secret information setTo reader, σiFor ξiThe mappings of middle identification setsi={ IDi,xx| 1≤x≤M }, wherein πxIt is to indicate and IDi,xAssociated label code key, i.e., In the sub-mark set of all labels storage, include mark IDi,xLabel unique code key formed setWhen any one label does not all include IDi,xWhen πxFor empty set.
Anonymity group technology provided in this embodiment also has the advantage that
Secret protection: it when attacker is a certain group membership or by illegal channels gets a group code key, can be solved based on this Internal mark ID outi,jx, however due to IDi,jxMay be to be shared by group member, attacker can not be determined as group in that The mark that a member generates, so that member identities can not be distinguished.Further the member of identical illness is divided into one group by us, at The information of member has equity, and the group key that member shares is not easy to be compromised away, and the group member for leaking group key is same It will cause the hidden danger of the privacy leakage of itself.
Safety: assuming that attacker wants personation label, not identifying corresponding code key, can not generate legal message V, At reader end, suitable code key can not be found and decrypt illegal message V.In addition, U, V are equal using the parameter inside symmetric cryptography Have a random number participation, ciphertext be it is random uncertain, cannot achieve tracking attack.Same attacker can not also implement to reset Attack, due to every wheel certification request, the random number that reader is sent is different, with the current response of previous message back, is readding Reading device end can not find suitable code key and be decrypted.
Harmony between privacy and scalability: assuming that the group membership's quantity for sharing some mark is k, then with group Scale increases k value and will also increase, and the secret protection degree of user can improve.It equally will cause authentication efficiency as k is worth increasing Decline, by adjusting the adjustable k value of size of division group scale, thus the problem of balanced secret protection and efficiency.Due to recognizing The time complexity of card is the scaling concern that linear authentication efficiency determines system scale, and therefore, which may be implemented Equilibrium between privacy and scalability.
Embodiment 2
A kind of authentication method is proposed referring to the signal of Fig. 2, in the present embodiment, when medical staff wants regular ward round, to be checked When the basal conditions of patient, by hand-held RFID label tag, the wristband label of patient is scanned.Label can be sent after authenticating successfully To the essential information of some patients of reader, reader can also check the medical condition of patient, these information by database Healthcare givers can be instructed to formulate effective medical measure.Specifically, anonymity point of the authentication method using above-mentioned Verification System Group method, and it is further comprising the steps of,
Reader generates random number nr, and label is sent to as request message;
Label receives request message nrAfterwards, random number n is generatedt, from the sub-mark collection Ω of storagei,jSelect a mark IDi,jxIt is identified as certification.It calculatesAnd U, V are sent to reader;
After receiving message U, V, reader retrieves all group code keysCiphertext U is decrypted, when the plaintext solved In include nr, then the group where label is found, and extract IDi,jx.Reader traversal and IDi,jxRelevant all certification code key k ∈πx, solve in ciphertext comprising nt, and get corresponding certification code keyThen authenticating tag TjSuccess.Reader is thought to mark It is legal for signing, otherwise termination protocol.
Reader calculatedAnd W is sent to label.After label receives message, the code key of storage is utilizedW is decrypted, and whether is judged in the plaintext obtained comprising ntAnd IDi,jxIf all existed, smart-tag authentication reader Succeed, otherwise termination protocol.
If the following table 1 is the symbol meaning table being related to:
It should be noted that the above examples are only used to illustrate the technical scheme of the present invention and are not limiting, although referring to preferable Embodiment describes the invention in detail, those skilled in the art should understand that, it can be to technology of the invention Scheme is modified or replaced equivalently, and without departing from the spirit and scope of the technical solution of the present invention, should all be covered in this hair In bright scope of the claims.

Claims (10)

1. a kind of anonymous group technology of Verification System, it is characterised in that: include the following steps,
Label initializes, and the initialization operation includes the division and code key distribution of anonymous group, and the code key is divided Give out a contract for a project and includes a group code keyUnique code keyIdentification sets Ωi,jDistribution;
According to the division of anonymity group and the corresponding generation reader code key of code key distribution.
2. the anonymous group technology of Verification System as described in claim 1, it is characterised in that: the division of the anonymous group is gone back Including itself illness information relevant wrist strap radio frequency will be assigned when patient is medical by each anonymous corresponding a kind of illness of group Identify label, same type of patient will be divided into the same anonymous group GiIt is interior.
3. the anonymous group technology of Verification System as claimed in claim 1 or 2, it is characterised in that: the code key distribution is also wrapped Include following steps,
N number of label is divided into τ group in system, and every group possesses unique group keyThe group key is by labels all in group It is shared, while organizing GiIn each group membership TjIt is assigned a unique certification code key
Each set of tags GiIt is transported to a logo collection ξi={ IDi,1,IDi,2,...,IDi,M, any different group identification sets are not There are intersections, i.e.,
GiIn each label possess the identical identification sets of mark quantityΩi,jFor ξi Subset, there must be the mark shared with other members in the mark subset in label.
4. the anonymous group technology of Verification System as claimed in claim 2, it is characterised in that: the division of the anonymous group is also wrapped Including has N number of label in hypothesis system, label is divided into τ group, each group of GiLabel number is
5. the anonymous group technology of Verification System as claimed in claim 3, it is characterised in that: code key distribution further includes the I group label is Gi(i ∈ 1 ... τ }) it is the group code key of distribution oneTo GiGroup, the code key are organized interior all members and are shared, And give GiEach group membership TjDistribution one unique certification code key
6. the anonymous group technology of Verification System as described in claim 4 or 5, it is characterised in that: the code key distribution is also wrapped Include identification sets Ωi,jDistribution comprising,
Each set of tags sends a logo collection, GiThe logo collection of group label is ξi={ IDi,1,IDi,2,...,IDi,M, In for system join M number, any different two groups identification sets be not present intersection, i.e., And i, j ∈ 1 ... τ}。
7. the anonymous group technology of Verification System as claimed in claim 6, it is characterised in that: the code key distribution further includes group The distribution of interior member's sub-mark collection comprising,
GiIn each label possess identification setsCollection Each element is different in conjunction;Same mark may be organized together multiple labels and be shared, i.e.,q[IDi,jx∈(Ωi,p∩ Ωi,q)] p, q ∈ 1 ..., n } and p ≠ q.
8. the anonymous group technology of Verification System as claimed in claim 7, it is characterised in that: the reader code key generates packet It includes,
Manager is by all groups of secret information setIt is distributed to reader, σiFor ξiMiddle identification sets Mappingsi={ IDi,xx| 1≤x≤M }, wherein πxIt is to indicate and IDi,xAssociated label code key is stored in all labels Sub-mark set in, comprising mark IDi,xLabel unique code key formed set, when any one label does not all include IDi,xWhen πxFor empty set.
9. a kind of authentication method, it is characterised in that: using the anonymous grouping of the Verification System as described in claim 1~8 is any Method, and it is further comprising the steps of,
Reader generates random number nr, and label is sent to as request message;
Label receives request message nrAfterwards, random number n is generatedt, from the sub-mark collection Ω of storagei,jSelect a mark IDi,jx
It generatesAnd U, V are sent to reader.
10. authentication method as claimed in claim 5, it is characterised in that: the certification further includes,
After receiving message U, V, reader retrieves all group code keysCiphertext U is decrypted, is wrapped when in the plaintext solved Containing nr, then the group where label is found, and extract IDi,jx
Reader traversal and IDi,jxRelevant all certification code key k ∈ πx, solve in ciphertext comprising nt, and get and corresponding recognize Demonstrate,prove code keyThen authenticating tag TjSuccess;
Reader thinks that label is legal, otherwise termination protocol.
Reader calculatedAnd W is sent to label.After label receives message, the code key of storage is utilizedTo W It is decrypted, and whether judges in the plaintext obtained comprising ntAnd IDi,jxIf all existed, the success of smart-tag authentication reader, Otherwise termination protocol.
CN201811549552.2A 2018-12-18 2018-12-18 A kind of anonymous group technology and authentication method of Verification System Pending CN109711216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811549552.2A CN109711216A (en) 2018-12-18 2018-12-18 A kind of anonymous group technology and authentication method of Verification System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811549552.2A CN109711216A (en) 2018-12-18 2018-12-18 A kind of anonymous group technology and authentication method of Verification System

Publications (1)

Publication Number Publication Date
CN109711216A true CN109711216A (en) 2019-05-03

Family

ID=66256779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811549552.2A Pending CN109711216A (en) 2018-12-18 2018-12-18 A kind of anonymous group technology and authentication method of Verification System

Country Status (1)

Country Link
CN (1) CN109711216A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021933A (en) * 2022-05-30 2022-09-06 杭州电子科技大学上虞科学与工程研究院有限公司 Face anonymization method based on cyclic learning

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656632A (en) * 2015-12-29 2016-06-08 蓝盾信息安全技术股份有限公司 Group RFID tag identity authentication method
CN106603228A (en) * 2016-12-21 2017-04-26 广东工业大学 RFID key wireless generation method based on Rabin encryption
CN107480564A (en) * 2017-07-11 2017-12-15 天津大学 A kind of improved RFID groups authentication method
CN108601001A (en) * 2018-03-09 2018-09-28 天津大学 A kind of RFID groups authentication method that annular segmentation accelerates

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656632A (en) * 2015-12-29 2016-06-08 蓝盾信息安全技术股份有限公司 Group RFID tag identity authentication method
CN106603228A (en) * 2016-12-21 2017-04-26 广东工业大学 RFID key wireless generation method based on Rabin encryption
CN107480564A (en) * 2017-07-11 2017-12-15 天津大学 A kind of improved RFID groups authentication method
CN108601001A (en) * 2018-03-09 2018-09-28 天津大学 A kind of RFID groups authentication method that annular segmentation accelerates

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
广东省卫生厅: "《数字化医院建设与实践》", 31 December 2008, 广东经济出版社 *
张立仁: "两种RFID安全认证协议的设计与分析", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
李智聪: "物联网中增强安全的RFID认证协议", 《信息网络安全》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021933A (en) * 2022-05-30 2022-09-06 杭州电子科技大学上虞科学与工程研究院有限公司 Face anonymization method based on cyclic learning
CN115021933B (en) * 2022-05-30 2023-10-27 杭州电子科技大学上虞科学与工程研究院有限公司 Face anonymizing method based on cyclic learning

Similar Documents

Publication Publication Date Title
Rahman et al. A privacy preserving framework for RFID based healthcare systems
Fan et al. Lightweight RFID protocol for medical privacy protection in IoT
Wu et al. A lightweight and privacy-preserving mutual authentication scheme for wearable devices assisted by cloud server
Lu et al. Dynamic key-updating: Privacy-preserving authentication for RFID systems
Peris-Lopez et al. Flaws on RFID grouping-proofs. Guidelines for future sound protocols
Mujahid et al. RCIA: A new ultralightweight RFID authentication protocol using recursive hash
Khan et al. An improved user authentication protocol for healthcare services via wireless medical sensor networks
US9003486B2 (en) Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests
Ali et al. A secure and efficient multi-factor authentication algorithm for mobile money applications
Chen et al. Using RFID yoking proof protocol to enhance inpatient medication safety
Xie et al. Security enhanced RFID authentication protocols for healthcare environment
Kaul et al. RFID authentication protocol to enhance patient medication safety
CN109067706A (en) Lightweight RFID method for secret protection, wireless communication system under scenes of internet of things
Shukla et al. An authenticated and secure electronic health record system
Picazo-Sanchez et al. Two RFID Standard-based Security protocols for healthcare environments
Özcanhan et al. Cryptographically supported NFC tags in medication for better inpatient safety
Wu et al. Blockchain-based anonymous data sharing with accountability for Internet of Things
Munilla et al. Cryptanalaysis of an EPCC1G2 standard compliant ownership transfer scheme
Jabeen et al. Enhanced architecture for privacy preserving data integration in a medical research environment
Khalid et al. Cryptanalysis of ultralightweight mutual authentication protocol for radio frequency identification enabled Internet of Things networks
CN109711216A (en) A kind of anonymous group technology and authentication method of Verification System
Yang et al. A privacy model for RFID tag ownership transfer
Makina et al. Survey on security and privacy in Internet of Things‐based eHealth applications: Challenges, architectures, and future directions
Chuang et al. Constructing effective lightweight privacy protection in RFID-based systems
Morshed et al. Efficient mutual authentication protocol for radiofrequency identification systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190503