Enforcing Trust Preferences in Mobile Person-to-Person Payments

The technological advancements in Internet speeds, increased computing power and smart phones have pushed the rise of new digital methods supporting mobile person-to-person (P2P) payments. Despite the growing interest in these new methods, we believe that, to fully enable this increasing rise of digital wallets, there is the need for tools helping a person in judging the risk of a money transfer. For this purpose, this paper aims at exploiting social network connections. This is achieved by making payers/payees able to state their trust preferences with respect to the potential payees/payers. Trust preference evaluation requires to find social connections between a payer and a payee across, possible, different social network realms. We therefore propose a light cryptography protocol, specifically targeted to mobile P2P payments, that besides providing good performance, ensures user information privacy.

[1]  Mehmet A. Orgun,et al.  Trust Transitivity in Complex Social Networks , 2011, AAAI.

[2]  Said El Hajji,et al.  Homomorphic Encryption Applied to the Cloud Computing Security , 2012 .

[3]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[4]  Brian King,et al.  Mapping an Arbritrary Message to an Elliptic Curve When Defined over GF(2^n) , 2009, Int. J. Netw. Secur..

[5]  Brian King,et al.  A Point Compression Method for Elliptic Curves Defined over GF(2 n) , 2004, Public Key Cryptography.

[6]  Josep Domingo-Ferrer,et al.  Privacy homomorphisms for social networks with private relationships , 2008, Comput. Networks.

[7]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[8]  E. M. Mohamed,et al.  Randomness testing of modern encryption techniques in cloud environment , 2012, 2012 8th International Conference on Informatics and Systems (INFOS).

[9]  Panagiotis Papadimitratos,et al.  Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.

[10]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[11]  Dan Brickley,et al.  FOAF Vocabulary Specification , 2004 .

[12]  Barbara Carminati,et al.  P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.

[13]  J. Golbeck Personalizing Applications through Integration of Inferred Trust Values in Semantic Web-Based Social Networks , 2005 .

[14]  Josep Domingo-Ferrer A Public-Key Protocol for Social Networks with Private Relationships , 2007, MDAI.

[15]  Kamlesh Dutta,et al.  A Survey on Elliptic Curve Cryptography for Pervasive Computing Environment , 2010 .

[16]  Steven D. Galbraith,et al.  Point compression for Koblitz elliptic curves , 2011, Adv. Math. Commun..