{"title":"一种基于秘密共享的RFID安全协议","authors":"Zhijian Gao, Yi Jiang, Z. Lin","doi":"10.1109/IMCCC.2012.188","DOIUrl":null,"url":null,"abstract":"The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost.","PeriodicalId":394548,"journal":{"name":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An Effective RFID Security Protocol Based on Secret Sharing\",\"authors\":\"Zhijian Gao, Yi Jiang, Z. Lin\",\"doi\":\"10.1109/IMCCC.2012.188\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost.\",\"PeriodicalId\":394548,\"journal\":{\"name\":\"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control\",\"volume\":\"24 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-12-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMCCC.2012.188\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Second International Conference on Instrumentation, Measurement, Computer, Communication and Control","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2012.188","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Effective RFID Security Protocol Based on Secret Sharing
The Hash function is used to design a radio frequency identification (RFID) security protocol, which is based on secret sharing. The improved hash-based identifier variation (HIDV) scheme is adopted to solve the following questions: location privacy, resist replay and forgery attacks. Since the synchronization loss between tag and server is resolved, we can control the denial of service that exists in many RFID security protocols. Compared with other related protocols in security, efficiency and cost, the proposed protocol is proved to be safe, effective and low-cost.