A Secure and Efficient Key Authentication using Bilinear Pairing for NFC Mobile Payment Service

被引:18
作者
Chen, Xinyi [1 ]
Choi, Kyung [2 ]
Chae, Kijoon [1 ]
机构
[1] Ewha Womans Univ, Dept Comp Sci & Engn, Seoul, South Korea
[2] Sungkyunkwan Univ, Sch Informat & Commun Engn, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
NFC mobile payment; Bilinear pairing; ECC; Authentication; SIGNATURE SCHEME;
D O I
10.1007/s11277-017-4261-9
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Near Field Communication (NFC) is widely used as a contactless communication technology in mobile phones for mobile payments. However, achieving payment security is challenging due to the authentication between the NFC-enabled mobile phone users and the merchants. Attackers can use the vulnerabilities of card payment transactions to compromise the NFC communication message and then transmit the wrong payment information to the communicators. An efficiency key authentication scheme is proposed to help NFC-enabled mobile payment communication using bilinear pairing. The proposed scheme can furnish a secure environment for NFC mobile payments by providing unlinkability and unforgeability functions to prevent attack scenarios.
引用
收藏
页码:1 / 17
页数:17
相关论文
共 16 条
[1]  
[Anonymous], 2004, IACR CRYPTOL EPRINT
[2]   PSP: Private and secure payment with RFID [J].
Blass, Erik-Oliver ;
Kurmus, Anil ;
Molva, Refik ;
Strufe, Thorsten .
COMPUTER COMMUNICATIONS, 2013, 36 (04) :468-480
[3]   A novel electronic cash system with trustee-based anonymity revocation from pairing [J].
Chen, Yalin ;
Chou, Jue-Sam ;
Sun, Hung-Min ;
Cho, Ming-Hsun .
ELECTRONIC COMMERCE RESEARCH AND APPLICATIONS, 2011, 10 (06) :673-682
[4]   Efficient and provably-secure certificateless short signature scheme from bilinear pairings [J].
Du, Hongzhen ;
Wen, Qiaoyan .
COMPUTER STANDARDS & INTERFACES, 2009, 31 (02) :390-394
[5]   Provably secure randomized blind signature scheme based on bilinear pairing [J].
Fan, Chun-I ;
Sun, Wei-Zhe ;
Huang, Vincent Shi-Ming .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) :285-293
[6]  
Francis Lishoy, 2010, Proceedings Sixth Advanced International Conference on Telecommunications (AICT 2010), P452, DOI 10.1109/AICT.2010.52
[7]   A Taxonomy of Pairing-Friendly Elliptic Curves [J].
Freeman, David ;
Scott, Michael ;
Teske, Edlyn .
JOURNAL OF CRYPTOLOGY, 2010, 23 (02) :224-280
[8]  
Hsu-Chen Cheng, 2011, Proceedings of the 2011 13th International Conference on Advanced Communication Technology (ICACT). Smart Service Innovation through Mobile Interactivity, P1095
[9]  
Husni E., 2011, 2011 2nd International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering, P97, DOI 10.1109/ICICI-BME.2011.6108602
[10]   Provably secure certificateless strong designated verifier signature scheme based on elliptic curve bilinear pairings [J].
Islam, S. K. Hafizul ;
Biswas, G. P. .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2013, 25 (01) :51-61