Browse > Article
http://dx.doi.org/10.3745/JIPS.2013.9.3.461

Anonymous Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment  

Park, Sung-Wook (Department of Computer Software Engineering, Soonchunhyang University)
Lee, Im-Yeong (Department of Computer Software Engineering, Soonchunhyang University)
Publication Information
Journal of Information Processing Systems / v.9, no.3, 2013 , pp. 461-476 More about this Journal
Abstract
Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an zero-knowledge proof scheme and ring signature based on NTRU for protecting user information in NFC mobile payment systems without directly using private financial information of the user.
Keywords
NFC Mobile Payment; Zero Knowledge Proof; NTRU; Ring Signature;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 A.Shamir, "ID-Based Cryptosystems and Signature Schemes", Crypto'84, pp.47-53, 1985.
2 A.Fiat and A.Shamir, "How to Prove Yourself: Practical Solution to Identification and Signature Problem", Crypto'86, Vol 263, pp.186-194, 1986
3 L.C.Guillou and J.J.Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge", Crypto'88, p.216-231, 1988
4 C.P.Schnorr, "Efficient Signature Generation by Smart Card", Journal of Cryptology, pp.161-174, 1991.4
5 S.H Lim, J.W Jeon, J.I Jin, O.Y Lee, "Study on NFC Security Analysis and UICC Alternative Effect", Korea Information and Communications Society, 2011   과학기술학회마을   DOI   ScienceOn
6 Ernst Haselsteiner, Klemens Breitfuss, "Security in near field communication(NFC)", Workshop on RFID Security RFIDSec, 2006
7 "Google Wallet: Security", Google, 2011
8 "MasterCard PayPass", MasterCard, 2011
9 J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU : A Ring Based Public Key Cryptosystem", in Algorithmic Number Theory(ANTS III), 1998.
10 S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208.   DOI   ScienceOn
11 R.L. Rivest, A. Shamir, Y. Tauman, "How to Leak a Secret", Advances in Cryptology-ASIACRYPT, 2001.
12 "A Study on the Development of Cryptosystems for the Next Generation", National Security Research Institute, 2006
13 S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208.   DOI   ScienceOn