• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yuan Bianqing, Liu Jiqiang. A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags[J]. Journal of Computer Research and Development, 2015, 52(10): 2323-2331. DOI: 10.7544/issn1000-1239.2015.20150555
Citation: Yuan Bianqing, Liu Jiqiang. A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags[J]. Journal of Computer Research and Development, 2015, 52(10): 2323-2331. DOI: 10.7544/issn1000-1239.2015.20150555

A Universally Composable Secure Group Ownership Transfer Protocol for RFID Tags

More Information
  • Published Date: September 30, 2015
  • In some applications, it is often needed to simultaneously transfer the ownership of a group of RFID (radio frequency identification) tags in a session. However, most of the existing group ownership transfer schemes for RFID tags generally require the support of a trusted third party, and they often have many security and privacy protection issues. Based on the analysis of security requirements, a secure and efficient group ownership transfer protocol for RFID tags is designed. The new protocol supports simultaneous ownership transfer of a group of RFID tags without a trusted third party. Then, in the UC(universally composable) framework, an ideal functionality capturing the secure group ownership transfer for RFID tags is formally defined, and it is proved that the new protocol realizes the above defined ideal functionality. Compared with the existing group ownership transfer protocols for RFID tags, the new protocol provides the security and privacy properties such as anonymity, untraceability, mutual authentication, authorized access, resistance to de-synchronization attack, forward privacy protection and backward privacy protection. Meanwhile, it satisfies UC security. Furthermore, the new protocol has low computational complexity. In addition, the number of storage on the tag and the number of interaction among the entities are small.
  • Related Articles

    [1]Jiang Yi, Yang Yong, Yin Jiali, Liu Xiaolei, Li Jiliang, Wang Wei, Tian Youliang, Wu Yingcai, Ji Shouling. A Survey on Security and Privacy Risks in Large Language Models[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440265
    [2]Li Nan, Ding Yidong, Jiang Haoyu, Niu Jiafei, Yi Ping. Jailbreak Attack for Large Language Models: A Survey[J]. Journal of Computer Research and Development, 2024, 61(5): 1156-1181. DOI: 10.7544/issn1000-1239.202330962
    [3]Chen Xuanting, Ye Junjie, Zu Can, Xu Nuo, Gui Tao, Zhang Qi. Robustness of GPT Large Language Models on Natural Language Processing Tasks[J]. Journal of Computer Research and Development, 2024, 61(5): 1128-1142. DOI: 10.7544/issn1000-1239.202330801
    [4]Zhang Mi, Pan Xudong, Yang Min. JADE-DB:A Universal Testing Benchmark for Large Language Model Safety Based on Targeted Mutation[J]. Journal of Computer Research and Development, 2024, 61(5): 1113-1127. DOI: 10.7544/issn1000-1239.202330959
    [5]Jin Dongming, Jin Zhi, Chen Xiaohong, Wang Chunhui. ChatModeler: A Human-Machine Collaborative and Iterative Requirements Elicitation and Modeling Approach via Large Language Models[J]. Journal of Computer Research and Development, 2024, 61(2): 338-350. DOI: 10.7544/issn1000-1239.202330746
    [6]Bao Yang, Yang Zhibin, Yang Yongqiang, Xie Jian, Zhou Yong, Yue Tao, Huang Zhiqiu, Guo Peng. An Automated Approach to Generate SysML Models from Restricted Natural Language Requirements in Chinese[J]. Journal of Computer Research and Development, 2021, 58(4): 706-730. DOI: 10.7544/issn1000-1239.2021.20200757
    [7]Wang Ye, Chen Junwu, Xia Xin, Jiang Bo. Intelligent Requirements Elicitation and Modeling: A Literature Review[J]. Journal of Computer Research and Development, 2021, 58(4): 683-705. DOI: 10.7544/issn1000-1239.2021.20200740
    [8]Tan Liang, Zhou Mingtian. XSSA/ADL: An XML-Based Security Requirement Architecture Description Language[J]. Journal of Computer Research and Development, 2007, 44(5): 737-747.
    [9]Yu Hao, Bu Fenglin, Gao Jianfeng. Perceptron for Language Modeling[J]. Journal of Computer Research and Development, 2006, 43(2): 260-267.
    [10]Li Jie, Qin Yanyan, Tian Feng, and Dai Guozhong. CoPenML: An XML-Based Component Architecture for Pen-Based User Interface[J]. Journal of Computer Research and Development, 2005, 42(7): 1143-1152.

Catalog

    Article views (1379) PDF downloads (578) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return