DOI QR코드

DOI QR Code

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment

  • Park, Sung-Wook (Department of Computer Software Engineering, Soonchunhyang University) ;
  • Lee, Im-Yeong (Department of Computer Software Engineering, Soonchunhyang University)
  • Received : 2013.10.05
  • Accepted : 2013.03.07
  • Published : 2013.09.30

Abstract

Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Keywords

NFC Mobile Payment;Zero Knowledge Proof;NTRU;Ring Signature

Acknowledgement

Supported by : National Research Foundation of Korea(NRF)

References

  1. "Google Wallet: Security", Google, 2011
  2. "MasterCard PayPass", MasterCard, 2011
  3. J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU : A Ring Based Public Key Cryptosystem", in Algorithmic Number Theory(ANTS III), 1998.
  4. S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208. https://doi.org/10.1137/0218012
  5. R.L. Rivest, A. Shamir, Y. Tauman, "How to Leak a Secret", Advances in Cryptology-ASIACRYPT, 2001.
  6. "A Study on the Development of Cryptosystems for the Next Generation", National Security Research Institute, 2006
  7. S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208. https://doi.org/10.1137/0218012
  8. A.Shamir, "ID-Based Cryptosystems and Signature Schemes", Crypto'84, pp.47-53, 1985.
  9. A.Fiat and A.Shamir, "How to Prove Yourself: Practical Solution to Identification and Signature Problem", Crypto'86, Vol 263, pp.186-194, 1986
  10. L.C.Guillou and J.J.Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge", Crypto'88, p.216-231, 1988
  11. C.P.Schnorr, "Efficient Signature Generation by Smart Card", Journal of Cryptology, pp.161-174, 1991.4
  12. S.H Lim, J.W Jeon, J.I Jin, O.Y Lee, "Study on NFC Security Analysis and UICC Alternative Effect", Korea Information and Communications Society, 2011 https://doi.org/10.7840/KICS.2011.36B.1.29
  13. Ernst Haselsteiner, Klemens Breitfuss, "Security in near field communication(NFC)", Workshop on RFID Security RFIDSec, 2006

Cited by

  1. A New Self-Certified Signature Scheme Based on NTRUSing for Smart Mobile Communications vol.96, pp.3, 2017, https://doi.org/10.1007/s11277-017-4385-y
  2. Design of a Distributed Personal Information Access Control Scheme for Secure Integrated Payment in NFC vol.7, pp.2, 2015, https://doi.org/10.3390/sym7020935
  3. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography vol.2015, 2015, https://doi.org/10.1155/2015/807213
  4. Improving the Authentication Scheme and Access Control Protocol for VANETs vol.16, pp.11, 2014, https://doi.org/10.3390/e16116152
  5. An Efficient Algorithm for Maximizing Range Sum Queries in a Road Network vol.2014, 2014, https://doi.org/10.1155/2014/541602
  6. A prediction and auto-execution system of smartphone application services based on user context-awareness vol.60, pp.8, 2014, https://doi.org/10.1016/j.sysarc.2014.04.001
  7. A Study on Electronic-Money Technology Using Near Field Communication vol.7, pp.1, 2014, https://doi.org/10.3390/sym7010001
  8. A Study on High Secure and Efficient MANET Routing Scheme vol.2015, 2015, https://doi.org/10.1155/2015/365863
  9. Time evolution of face recognition in accessible scenarios vol.5, pp.1, 2015, https://doi.org/10.1186/s13673-015-0043-0
  10. Privacy-Enhancing Security Protocol in LTE Initial Attack vol.6, pp.4, 2014, https://doi.org/10.3390/sym6041011
  11. Mobile payment in Fintech environment: trends, security challenges, and services vol.8, pp.1, 2018, https://doi.org/10.1186/s13673-018-0155-4