An Unlinkable Anonymous Payment Scheme based on near field communication

Display Omitted We propose an anonymous mobile payment protocol to protect users' privacy.Using anonymizing schemes to improve anonymity and unlinkability in a mobile transaction.Users can use mobile phones with NFC to perform commercial transactions. A number of mobile payment studies have been proposed in recently years. Most of the schemes are largely focused on transaction security, not on users' privacy. In this paper, we propose an Unlinkable Anonymous Payment Scheme to provide a secure and anonymous mobile commerce environment. In the proposed protocol, a user applies an anonymous virtual credit card from a trusted service manager. The sensitive information of the applied credit card is stored in the secure elements of user's mobile device. Our proposed protocol ensures various imperative security properties such as anonymity, unlinkability, and non-repudiation etc.

[1]  Mohsen Toorani,et al.  SSMS - A secure SMS messaging protocol for the m-payment systems , 2008, 2008 IEEE Symposium on Computers and Communications.

[2]  Heekuck Oh,et al.  Conditional privacy preserving security protocol for NFC applications , 2012, 2012 IEEE International Conference on Consumer Electronics (ICCE).

[3]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[4]  Bart Preneel,et al.  Offline NFC payments with electronic vouchers , 2009, MobiHeld '09.

[5]  Roberto Di Pietro,et al.  COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.

[6]  Kangseok Kim,et al.  Secure Mobile Payment Service Using Vibration Cues on Near Field Communication Smartphone , 2013 .

[7]  Xiong Li,et al.  An improved remote user authentication scheme with key agreement , 2014, Comput. Electr. Eng..

[8]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[9]  Sougata Mukherjea,et al.  Towards an interoperable mobile wallet service , 2013, 2013 10th International Conference and Expo on Emerging Technologies for a Smarter World (CEWIT).

[10]  J.-H. Chiu,et al.  NFC Mobile Transactions and Authentication Based on GSM Network , 2010, 2010 Second International Workshop on Near Field Communication.

[11]  Kurt Dietrich An integrated architecture for trusted computing for java enabled embedded devices , 2007, STC '07.

[12]  Gheorghita Ghinea,et al.  Mobile Transaction over NFC and GSM , 2013, IACR Cryptol. ePrint Arch..

[13]  Wei-Hsiang Liao,et al.  Android-based mobile payment service protected by 3-factor authentication and virtual private ad hoc networking , 2012, 2012 Computing, Communications and Applications Conference.

[14]  Seong-Ro Lee,et al.  Proposed M-Payment System Using Near-Field Communication and Based on WSN-Enabled Location-Based Services for M-Commerce , 2014, Int. J. Distributed Sens. Networks.

[15]  Florian Kerschbaum,et al.  Privacy-preserving billing for e-ticketing systems in public transportation , 2013, IACR Cryptol. ePrint Arch..

[16]  Djamel Tandjaoui,et al.  An end-to-end secure key management protocol for e-health applications , 2015, Comput. Electr. Eng..

[17]  Tor-Morten Grønli,et al.  Towards NFC payments using a lightweight architecture for the Web of Things , 2015, Computing.

[18]  Pascal Urien EMV-TLS, a secure payment protocol for NFC enabled mobiles , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).

[19]  G.P. Hancke,et al.  Using 3G network components to enable NFC mobile transactions and authentication , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.

[20]  Ninghui Li,et al.  Dynamic Virtual Credit Card Numbers , 2007, Financial Cryptography.