{"title":"基于哈希链的改进RFID隐私保护方案","authors":"Ya-ling Zhang, Huijie Guo","doi":"10.1109/LEITS.2010.5665033","DOIUrl":null,"url":null,"abstract":"Radio Frequency Identification(RFID) is a new automatic identification technology. Widespread application of RFID may leak user's privacy. To solve this problem, an improved RFID privacy protection scheme based on Hash-chain is proposed, in which a database identifier field is introduced in RFID tag. When a RFID tag is identified by a reader, by using of the database identifier field, the reader can quickly decide whether the RFID tag belongs to the database system that the reader is associated with. Further treatment is not required if the RFID tag doesn't belong to the database system, thus the privacy of any RFID that isn't relevant with the database is protected. The identification load will be reduced remarkably and the efficiency will be improved evidently in the new authentication scheme.","PeriodicalId":173716,"journal":{"name":"2010 International Conference on Logistics Engineering and Intelligent Transportation Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"An Improved RFID Privacy Protection Scheme Based on Hash-Chain\",\"authors\":\"Ya-ling Zhang, Huijie Guo\",\"doi\":\"10.1109/LEITS.2010.5665033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Radio Frequency Identification(RFID) is a new automatic identification technology. Widespread application of RFID may leak user's privacy. To solve this problem, an improved RFID privacy protection scheme based on Hash-chain is proposed, in which a database identifier field is introduced in RFID tag. When a RFID tag is identified by a reader, by using of the database identifier field, the reader can quickly decide whether the RFID tag belongs to the database system that the reader is associated with. Further treatment is not required if the RFID tag doesn't belong to the database system, thus the privacy of any RFID that isn't relevant with the database is protected. The identification load will be reduced remarkably and the efficiency will be improved evidently in the new authentication scheme.\",\"PeriodicalId\":173716,\"journal\":{\"name\":\"2010 International Conference on Logistics Engineering and Intelligent Transportation Systems\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Logistics Engineering and Intelligent Transportation Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LEITS.2010.5665033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Logistics Engineering and Intelligent Transportation Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LEITS.2010.5665033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Improved RFID Privacy Protection Scheme Based on Hash-Chain
Radio Frequency Identification(RFID) is a new automatic identification technology. Widespread application of RFID may leak user's privacy. To solve this problem, an improved RFID privacy protection scheme based on Hash-chain is proposed, in which a database identifier field is introduced in RFID tag. When a RFID tag is identified by a reader, by using of the database identifier field, the reader can quickly decide whether the RFID tag belongs to the database system that the reader is associated with. Further treatment is not required if the RFID tag doesn't belong to the database system, thus the privacy of any RFID that isn't relevant with the database is protected. The identification load will be reduced remarkably and the efficiency will be improved evidently in the new authentication scheme.