Browse > Article
http://dx.doi.org/10.3745/KTCCS.2013.2.3.133

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment  

Park, Sung Wook (순천향대학교 컴퓨터소프트웨어공학과)
Lee, Im Yeong (순천향대학교 컴퓨터소프트웨어공학과)
Publication Information
KIPS Transactions on Computer and Communication Systems / v.2, no.3, 2013 , pp. 133-142 More about this Journal
Abstract
Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.
Keywords
NFC Mobile Payment; NTRU; Zero-Knowledge Proof; User Authentication;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 "MasterCard PayPass", MasterCard, 2011.
2 "Google Wallet: Security", Google, 2011.
3 J. Hoffstein, J. Pipher, J. H. Silverman, "NTRU : A Ring Based Public Key Cryptosystem", in Algorithmic Number Theory(ANTS III), 1998.
4 J. Hoffstein, N. Howgrave-Graham, J. Pipher, J. H. Silverman, W. Whyte, "NtruSign : Digital Signatures using the Ntru Lattice", Topics in cryptology, 2003.
5 HC Cheng, WW Liao, "A secure and practical key management mechanism for NFC read-write mode", IEEE, 2011. 02.
6 G. Madlmayr, J. Langer, "Near Field Communication based Mobile Payment System", 2008.
7 S.Goldwasser, SMicali and C.Rackoff, "The Knowled ge Complexity of Interactive Proof Systems", SIAM Journal on Computing, 18(1989), pp.186-208.   DOI   ScienceOn
8 A.Shamir, "Identity-Based Cryptosystems and Signature Schemes", Crypto'84, pp.47-53, 1985.
9 A.Fiat and A.Shamir, "How to Prove Yourself: Practical Solution to Identification and Signature Problem", Crypto'86, Vol.263, pp.186-194, 1986.
10 L.C.Guillou and J.J.Quisquater, "A Paradoxical Identity-Based Signature Scheme Resulting from Zero-Knowledge", Crypto'88, pp.216-231, 1988.
11 C.P.Schnorr, "Efficient Signature Generation by Smart Card", Journal of Cryptology, pp.161-174, 1991. 4
12 "Mobile NFC Technical Guidelines", GSMA, 2007.
13 S.H Lim, J.W Jeon, J.I Jin, O.Y Lee, "Study on NFC Security Analysis and UICC Alternative Effect", Korea Information and Communications Society, 2011.   과학기술학회마을   DOI   ScienceOn
14 Ernst Haselsteiner, Klemens Breitfuss, "Security in near field communication(NFC), Workshop on RFID Security RFIDSec, 2006.
15 "A Study on the Development of Cryptosystems for the Next Generation", National Security Research Institute, 2006.