a protocol for online mobile payment
play

A Protocol for Online Mobile Payment Asgeir Steine 1/10 Plan: - PowerPoint PPT Presentation

A Protocol for Online Mobile Payment Asgeir Steine 1/10 Plan: Mobile Online Payment Properties Blind Signatures Near Field Channel U <-> M Anonymous Online Channel B <-> U Protocol 2/10 Mobile Online Payment


  1. A Protocol for Online Mobile Payment Asgeir Steine 1/10

  2. Plan: ◮ Mobile Online Payment ◮ Properties ◮ Blind Signatures ◮ Near Field Channel U <-> M ◮ Anonymous Online Channel B <-> U ◮ Protocol 2/10

  3. Mobile Online Payment B U M withdraw pay 3/10

  4. Mobile Online Payment B U M withdraw pay claim 3/10

  5. Mobile Online Payment B U M withdraw pay 3/10

  6. Mobile Online Payment B U M withdraw pay 3/10

  7. Mobile Online Payment B U M withdraw pay 3/10

  8. Mobile Online Payment B U M withdraw pay ◮ Many potential threats. 3/10

  9. Mobile Online Payment B U M withdraw pay ◮ Many potential threats. ◮ Hidden players: Network operator N , Mobile Service Provider S . 3/10

  10. Properties Transaction security: ◮ Bank security (withdraw ≥ claim). ◮ Merchant security (claim ≥ pay). ◮ User security (pay ≥ withdraw). Privacy: ◮ Bank should learn who you are, but not where (same with N ). ◮ Merchant should learn where you are, but not who (same with S ). 4/10

  11. Weak Blind Signatures ◮ Blind signatures allow users to request signatures from someone without disclosing the message to be signed. ◮ A blind signature scheme consist of five algorithms: Key generation ( Gen ) , Request ( Req ) , Issue ( Issue ) , Unblind ( UnBlind ) , and Verify ( Ver ) . ◮ Completeness: ( sk , vk ) ← Gen ( ρ, s ) ← Req ( vk , m ) ˜ σ ← Issue ( sk , ρ ) σ ← UnBlind ( s , ˜ σ ) ⇒ Ver ( vk , σ, m ) = true 5/10

  12. Weak Blind Signatures ◮ Weak Unforgeability: No efficient adversary (given a honestly generated vk ) can sign more messages than he has received issue tokens ˜ σ . ◮ Weak Blindness: A bit technical, but essentially no efficient adversary (given honestly generated keys ( sk , vk ) can distinguish ρ ← Req ( vk , m ) from ρ ′ ← Req ( vk , m ′ ) for any m , m ′ . 6/10

  13. Weak Blind Signatures ◮ Weak Unforgeability: No efficient adversary (given a honestly generated vk ) can sign more messages than he has received issue tokens ˜ σ . ◮ Weak Blindness: A bit technical, but essentially no efficient adversary (given honestly generated keys ( sk , vk ) can distinguish ρ ← Req ( vk , m ) from ρ ′ ← Req ( vk , m ′ ) for any m , m ′ . (Even after seeing the corresponding signatures.) 6/10

  14. Near Field Channel U M ◮ Attacker can delay/stop messages and eavesdrop, but not modify (unless U or M are corrupted). ◮ User identity does not leak. ◮ User location leaks if M is corrupt or adversary is eavsdropping. 7/10

  15. Anonymous Online Channel B U ◮ A bit technical functionality (previous work). ◮ Adversary has full control of the network in corrupted locations. ◮ U ’s identity leaks only if service provider S is corrupted. ◮ However N can trace U through corrupted locations by denial of service attack. 8/10

  16. Protocol B U M 9/10

  17. Protocol Tr , M , B Tr B U M 9/10

  18. Protocol Tr , M , B Tr Tr B U M 9/10

  19. Protocol Tr , M , B Tr Tr B U M c 9/10

  20. Protocol Tr , M , B Tr Tr B U M c , σ M ( c , Tr ) c 9/10

  21. Protocol Tr , M , B Tr Tr B U M c , σ M ( c , Tr ) c k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . 9/10

  22. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M c , σ M ( c , Tr ) c k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  23. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  24. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  25. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) σ ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . ◮ σ ← UnBlind ( s , ˜ σ ) . 9/10

  26. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) σ σ ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . ◮ σ ← UnBlind ( s , ˜ σ ) . 9/10

  27. Thank You. 10/10

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend