| Literature DB >> 31652797 |
Jia-Ning Luo1, Ming-Hour Yang2.
Abstract
In 2014, Yang proposed a method to enhance the current EMV credit card protocol (EPMAR). However, the protocol ignores the exceeding of a credit quota caused by multiple offline transactions, with the result that the amount spent can exceed the risk control scope. In this paper, we proposed an EMV-compatible offline mobile payment protocol with mutual authentication (EOPMA) to enhance EPMAR. In EOPMA, we use the reverse hash chain technique to guarantee the payment, which solves the problem of credit quotas getting exceeded because of multiple offline payments. During a transaction, in addition to payment for merchandise, an offline authorization certificate for the transaction is sent to the merchant. The merchant can verify the correctness of the transaction in real time. Our protocol is compatible with the EMV standard, which is applicable to the retail environment of numerous merchants and effectively, making EMV transactions more secure and reliable. We use numerical analysis to examine the security and performance of the protocols. We formally check the correctness of EOPMA by using the Gong-Needham-Yahalom logic.Entities:
Keywords: EMV; NFC; mobile payment; reverse hash chain
Year: 2019 PMID: 31652797 PMCID: PMC6864807 DOI: 10.3390/s19214611
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1EOPMA infrastructure.
Figure 2EOPMA flowchart.
Sequence numbers and random numbers of secret factors.
| Serial Number | Random Nonce |
|---|---|
| ⋯ | ⋯ |
|
|
|
| ⋯ | ⋯ |
|
|
|
Figure 3Simple offline transaction credit splitting diagram.
Figure 4Offline certificate application and split credit line authorization processes.
Figure 5Offline certificate application and split credit line authorization protocol.
Figure 6Offline transaction process.
Figure 7Offline/online transaction protocol.
Figure 8Process of merchant payment request.
Figure 9Merchant payment request protocol.
Security comparison chart.
|
|
| Al-Tamimi | Modhoun |
|
|
| |
|---|---|---|---|---|---|---|---|
| Exceeding of a credit quota | O | X | X | X | X | X | X |
| Malicous phone | O | O | O | O | O | O | O |
| Malicous merchant | O | O | O | O | X | X | X |
| Confidentiality | O | O | O | O | X | X | X |
| Replay attacks | O | O | O | O | X | X | X |
| Data privacy | O | O | O | O | X | X | X |
| Integrity | O | O | O | O | O | O | O |
| Non-repudiation | O | O | O | O | O | X | X |
| MITM attacks | O | O | X | O | O | X | X |
| Clone attacks | O | O | O | O | X | X | X |
| Fully EMV-Compatiable | O | O | X | O | O | O | O |
Notations of the GNY proof.
| I | Issuer |
| M | Merchant |
| P | User’s NFC phone |
| Uses the symmetric key | |
| Uses the asymmetric key | |
|
| Message |
|
| |
|
| |
|
| |
|
| |
| For example, a random number or a counter. | |
|
| |
|
| |
|
| |
|
|
Initial assumptions.
| Phone | |
|
| The phone keeps a virtual credit card’s public key, private key, |
|
| and the shared encryption key. |
|
| The phone generates a session key |
|
| The phone holds the issuer’s public key. |
|
| The phone knows the merchant’s ID. |
| Merchant | |
|
| The merchant owns his identity, |
|
| the shared session key |
|
| credit card’s public key, |
|
| and the issuer’s public key. |
| Issuer | |
|
| The issuer has its own private key and public key, |
|
| the shared key with the phone, |
|
| the transaction key. |
|
| The issuer knows the merchant’s identity, |
|
| and uses a random number for verification. |
Goals of proposed protocol.
| Phase 3, offline certificate application and split credit quota authorization | |
|
| The phone believes |
|
| gets the shared key |
|
| Finally both of them believes all the messages are fresh |
|
| and are recognizable. |
|
| |
|
| |
|
| |
| Phase 4, offline and online transactions | |
|
| The merchant believes the phone has the offline certificate |
|
| and he believes |
|
| Finally the two parties believe the |
|
| and is recognizable. |
|
| |
| Phase 5, payment request by merchant | |
|
| Both the issuer and the merchant believe |
|
| and the issuer believes |
|
| |
|
| |
Proving process.
| Phase 3 | ||
| Message |
| The merchant and the issuer has built an secure channel |
| 1.1 | all the messages between them can be trusted. | |
| Message |
| The phone believes TK is fresh. |
| 1.2 | believes | |
| Finally both of them believes the | ||
| and is recognizable. | ||
|
| ||
| Phase 4 | ||
| Message |
| The phone believes |
| 2.1 | and | |
| Therefore, | ||
| Message |
| The merchant believes |
| 2.2 | The merchant gets the public key | |
| Therefore, the merchant can vertify the message | ||
|
| ||
| Message |
| The issuer and the merchant has established a secure channel, |
| 3 | all the messages exchanged between them can be trusted. | |
|
| The issuer gets phone’s public key | |
|
| key | |
| Therefore, the issuer can verify the message | ||
|
| ||
|
| ||
The operation time of cryptography functions (ms).
|
| Time |
|---|---|
| AES-128 ( | 0.15 |
| HMAC-128 ( | 0.16 |
| HMAC-256 ( | 0.25 |
| Random number generation | 0.01 |
| RSA encrypt ( | 0.59 |
| RSA decrypt ( | 5.67 |
The extra operations of EOPMA, comparing to EPMAR.
|
| Phone | Merchant | Issuer |
|---|---|---|---|
| Phase 1 | 0 | 0 | 0 |
| Phase 2 | 0 | 0 | 0 |
| Phase 3 |
|
|
|
| Phase 4 |
|
| 0 |
| Phase 5 | 0 | 0 |
|
Figure 10Extra computation time.