A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations

被引:11
作者
Zhou, Xiaoyi [1 ]
Ma, Jixin [2 ]
Yao, Xiaoming [3 ]
Li, Honglei [1 ]
机构
[1] Hainan Univ, Haikou, Hainan, Peoples R China
[2] Univ Greenwich, Ctr Comp & Computat Sci, Dept Informat Syst, London, England
[3] Hainan Univ, Coll Informat Sci & Technol, Haikou, Hainan, Peoples R China
关键词
Bisectional Multivariate Quadratic Equation; Counterfeit; Cryptography; Ergodic Matrix; RFID;
D O I
10.4018/IJSI.2018040101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This article proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base RAB such that [(AB)(->)]=lambda R_AB] <^>T, and generate 2n BMQ polynomials (denoted as.) over finite field F_q. Therefore, (F_q,.) is taken as a public key and (A, B,.) as a private key. In the encryption process, the EPC code is hashed into a message digest d_m. Then d_m is padded to d_m<^>' which is a non-zero 2nx2n matrix over F_q. With (A, B, lambda) and d_m<^>', s_m is formed as an n-vector over F_2. Unlike the existing anti-counterfeit scheme, the one the authors proposed is based on quantum cryptography, thus it is robust enough to resist the existing attacks and has high security.
引用
收藏
页码:1 / 9
页数:9
相关论文
共 16 条
[1]  
Fu W. X, 2014, RES RFID ENCRYPTION
[2]  
Gao L., 2017, WIRELESS PERS COMMUN, P1
[3]  
Guo D. H, 2009, RFID SECURITY MECH B, DOI DOI 10.1007/S11390-007-9010-1
[4]  
Kun Wang, 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), P133, DOI 10.1109/ICCASM.2010.5622549
[5]   Improved collision attack on hash function MD5 [J].
Liang, Jie ;
Lai, Xue-Jia .
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2007, 22 (01) :79-87
[6]  
Lin K, 2015, IEEE COMPUT SOC CONF, DOI 10.1109/CVPRW.2015.7301269
[7]   Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions [J].
Sajadieh, Mahdi ;
Dakhilalian, Mohammad ;
Mala, Hamid ;
Sepehrdad, Pouyan .
JOURNAL OF CRYPTOLOGY, 2015, 28 (02) :240-256
[8]  
So W, 2017, P 8 ACM IEEE S ARCH, P85
[9]  
Song Y, 2014, J NE NORMAL U
[10]  
Wang M, 2017, J BEIJING I GRAPHIC