摘要: Radio Frequency Identification (RFID) technology has been widely applied in many applications, such as the supply chain and warehouse management. A typical RFID system consists of tags, readers a back-end server. Usually, tag is constrained device attached to an object. It can be scanned by reader identified An important branch research authentication protocols. There have works addressing issues. The security privacy protocols become hot topics. Many proposed achieve various requirements. According different features protocols, related issues should considered. solutions, including model definition protocol analysis, are major work this thesis. Some existing attempted strong privacy. Unfortunately, even if they sacrifice efficiency cost most them cannot reach highest level called wide-strong To address issue, we review these problems previous propose some potential solutions. We then present private with formal proof also study scenario that server only assist authenticate tags without obtaining any tag’s identity. Accordingly, introduce novel concept authorized three adapt environments. As extension ownership transfer transfers from current owner new owner. precondition verify validity tags. Apart authentication, it necessary check authenticity Based on observation, solve problem secure protocol. Moreover, may shared multiple users. allowed all owners agree. In environment where trusted third party unavailable, one needs prevent forging agreements others. hybrid stores constant-size secret keys individually prove partial ownership. guarantees transferred prior presence full agreement.