{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:41:37Z","timestamp":1651884097495},"reference-count":17,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"abstract":"<p>This article proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base RAB such that [(AB) \u20d7 ]=\u03bb\u3016R_AB\u3017^T, and generate 2n BMQ polynomials (denoted as \u03c1) over finite field F_q. Therefore, (F_q, \u03c1) is taken as a public key and (A,B,\u03bb) as a private key. In the encryption process, the EPC code is hashed into a message digest d_m. Then d_m is padded to d_m^' which is a non-zero 2n\u00d72n matrix over F_q. With (A,B,\u03bb)and d_m^', s_m is formed as an n-vector over F_2. Unlike the existing anti-counterfeit scheme, the one the authors proposed is based on quantum cryptography, thus it is robust enough to resist the existing attacks and has high security.<\/p>","DOI":"10.4018\/ijsi.2018040101","type":"journal-article","created":{"date-parts":[[2018,2,22]],"date-time":"2018-02-22T17:14:37Z","timestamp":1519319677000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["A Novel RFID Anti-Counterfeiting Based on Bisectional Multivariate Quadratic Equations"],"prefix":"10.4018","volume":"6","author":[{"given":"Xiaoyi","family":"Zhou","sequence":"first","affiliation":[{"name":"Hainan University, Haikou, China"}]},{"given":"Jixin","family":"Ma","sequence":"additional","affiliation":[{"name":"University of Greenwich, London, UK"}]},{"given":"Xiaoming","family":"Yao","sequence":"additional","affiliation":[{"name":"Hainan University, Haikou, China"}]},{"given":"Honglei","family":"Li","sequence":"additional","affiliation":[{"name":"Hainan University, Haikou, China"}]}],"member":"2432","reference":[{"key":"IJSI.2018040101-0","author":"W. X.Fu","year":"2014","journal-title":"The Research of RFID Encryption System Based on Elliptic Curve Cryptography System"},{"issue":"1","key":"IJSI.2018040101-1","first-page":"1","article-title":"Low cost RFID security protocol based on Rabin symmetric encryption algorithm.","author":"L.Gao","year":"2017","journal-title":"Wireless Personal Communications"},{"key":"IJSI.2018040101-2","author":"D. H.Guo","year":"2009","journal-title":"The RFID Security Mechanism Based on AES and RSA Encrypt Algorithm"},{"key":"IJSI.2018040101-3","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-007-9010-1"},{"key":"IJSI.2018040101-4","first-page":"27","author":"K.Lin","year":"2015","journal-title":"Deep learning of binary hash codes for fast image retrieval. Computer Vision and Pattern Recognition Workshops"},{"key":"IJSI.2018040101-5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-013-9163-8"},{"key":"IJSI.2018040101-6","unstructured":"Shen, M. Y. and Teng, L. (2013). A kind of Optimization of the Mixed Key Management Scheme for Wireless Sensor Networks. Microelectronics and Computer, 9, 86-89."},{"key":"IJSI.2018040101-7","unstructured":"So, W., Narayanan, A., Oran, D., & Wang, Y. (2017). Toward fast NDN software forwarding lookup engine based on hash tables. In Proceedings of the Eighth ACM\/IEEE Symposium on Architectures for Networking & Communications Systems (pp. 85-86). IEEE."},{"key":"IJSI.2018040101-8","unstructured":"Song, Y., Zhao, Y. Z., & University, C. N. (2014). The application design of improved hfem public key cryptography plan on signature. Journal of Northeast Normal University."},{"key":"IJSI.2018040101-9","unstructured":"Wang, K., Bao, J., Wu, M., & Lu, W. (2010). Research on security management for Internet of Things. In Proceedings of the International Conference on Computer Application and System Modeling (Vol. 15, pp. 133-137)."},{"key":"IJSI.2018040101-10","unstructured":"Wang, M., & Zichen, L. I. (2017). Research and design of rfid security authentication protocol based on ntru. Journal of Beijing Institute of Graphic Communication."},{"key":"IJSI.2018040101-11","author":"S. A.Weis","year":"2003","journal-title":"Security and privacy in radio-frequency identification devices"},{"key":"IJSI.2018040101-12","doi-asserted-by":"crossref","unstructured":"Weis S. A., Sarma S. E. & Rivest R.L. (2004). Security and privacy aspects of low-cost radio frequency identification systems. In Security in pervasive computing (pp. 201-202). Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-540-39881-3_18"},{"key":"IJSI.2018040101-13","author":"W. M.Yuan","year":"2010","journal-title":"Research and development of data processing for network RFID"},{"issue":"11","key":"IJSI.2018040101-14","first-page":"1402","article-title":"Research on supply chain exception event management system.","volume":"10","author":"K. F.Zhang","year":"2004","journal-title":"Jisuanji Jicheng Zhizao Xitong"},{"key":"IJSI.2018040101-15","first-page":"197","article-title":"SoW: A hybrid DWT-SVD based secured image watermarking.","author":"X.Zhou","year":"2013","journal-title":"International Conference on Sensor Network Security Technology and Privacy Communication System"},{"key":"IJSI.2018040101-16","article-title":"BMQE system: A MQ equations system based on ergodic matrix.","author":"X.Zhou","year":"2011","journal-title":"International Conference on Security and Cryptography"}],"container-title":["International Journal of Software Innovation"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=201481","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T00:18:26Z","timestamp":1651882706000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSI.2018040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,4,1]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijsi.2018040101","relation":{},"ISSN":["2166-7160","2166-7179"],"issn-type":[{"value":"2166-7160","type":"print"},{"value":"2166-7179","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,1]]}}}