a protocol for online mobile payment
play

A Protocol for Online Mobile Payment Asgeir Steine 1/10 Plan: - PowerPoint PPT Presentation

A Protocol for Online Mobile Payment Asgeir Steine 1/10 Plan: Mobile Online Payment Properties Blind Signatures Near Field Channel U <-> M Anonymous Online Channel B <-> U Protocol 2/10 Mobile Online Payment


  1. A Protocol for Online Mobile Payment Asgeir Steine 1/10

  2. Plan: ◮ Mobile Online Payment ◮ Properties ◮ Blind Signatures ◮ Near Field Channel U <-> M ◮ Anonymous Online Channel B <-> U ◮ Protocol 2/10

  3. Mobile Online Payment B U M withdraw pay 3/10

  4. Mobile Online Payment B U M withdraw pay claim 3/10

  5. Mobile Online Payment B U M withdraw pay 3/10

  6. Mobile Online Payment B U M withdraw pay 3/10

  7. Mobile Online Payment B U M withdraw pay 3/10

  8. Mobile Online Payment B U M withdraw pay ◮ Many potential threats. 3/10

  9. Mobile Online Payment B U M withdraw pay ◮ Many potential threats. ◮ Hidden players: Network operator N , Mobile Service Provider S . 3/10

  10. Properties Transaction security: ◮ Bank security (withdraw ≥ claim). ◮ Merchant security (claim ≥ pay). ◮ User security (pay ≥ withdraw). Privacy: ◮ Bank should learn who you are, but not where (same with N ). ◮ Merchant should learn where you are, but not who (same with S ). 4/10

  11. Weak Blind Signatures ◮ Blind signatures allow users to request signatures from someone without disclosing the message to be signed. ◮ A blind signature scheme consist of five algorithms: Key generation ( Gen ) , Request ( Req ) , Issue ( Issue ) , Unblind ( UnBlind ) , and Verify ( Ver ) . ◮ Completeness: ( sk , vk ) ← Gen ( ρ, s ) ← Req ( vk , m ) ˜ σ ← Issue ( sk , ρ ) σ ← UnBlind ( s , ˜ σ ) ⇒ Ver ( vk , σ, m ) = true 5/10

  12. Weak Blind Signatures ◮ Weak Unforgeability: No efficient adversary (given a honestly generated vk ) can sign more messages than he has received issue tokens ˜ σ . ◮ Weak Blindness: A bit technical, but essentially no efficient adversary (given honestly generated keys ( sk , vk ) can distinguish ρ ← Req ( vk , m ) from ρ ′ ← Req ( vk , m ′ ) for any m , m ′ . 6/10

  13. Weak Blind Signatures ◮ Weak Unforgeability: No efficient adversary (given a honestly generated vk ) can sign more messages than he has received issue tokens ˜ σ . ◮ Weak Blindness: A bit technical, but essentially no efficient adversary (given honestly generated keys ( sk , vk ) can distinguish ρ ← Req ( vk , m ) from ρ ′ ← Req ( vk , m ′ ) for any m , m ′ . (Even after seeing the corresponding signatures.) 6/10

  14. Near Field Channel U M ◮ Attacker can delay/stop messages and eavesdrop, but not modify (unless U or M are corrupted). ◮ User identity does not leak. ◮ User location leaks if M is corrupt or adversary is eavsdropping. 7/10

  15. Anonymous Online Channel B U ◮ A bit technical functionality (previous work). ◮ Adversary has full control of the network in corrupted locations. ◮ U ’s identity leaks only if service provider S is corrupted. ◮ However N can trace U through corrupted locations by denial of service attack. 8/10

  16. Protocol B U M 9/10

  17. Protocol Tr , M , B Tr B U M 9/10

  18. Protocol Tr , M , B Tr Tr B U M 9/10

  19. Protocol Tr , M , B Tr Tr B U M c 9/10

  20. Protocol Tr , M , B Tr Tr B U M c , σ M ( c , Tr ) c 9/10

  21. Protocol Tr , M , B Tr Tr B U M c , σ M ( c , Tr ) c k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . 9/10

  22. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M c , σ M ( c , Tr ) c k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  23. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  24. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . 9/10

  25. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) σ ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . ◮ σ ← UnBlind ( s , ˜ σ ) . 9/10

  26. Protocol Tr , M , B Tr { ρ, U , k , σ U } pk B Tr B U M { ˜ σ } k c , σ M ( c , Tr ) c ˜ σ k ( ρ, s ) σ σ ◮ ( ρ, s ) ← Req ( vk , ( M , c )) . ◮ ˜ σ ← Issue ( sk , ρ ) . ◮ σ ← UnBlind ( s , ˜ σ ) . 9/10

  27. Thank You. 10/10

Recommend


More recommend