How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Offline NFC payments with electronic vouchers
Proceedings of the 1st ACM workshop on Networking, systems, and applications for mobile handhelds
Optimised to Fail: Card Readers for Online Banking
Financial Cryptography and Data Security
Near Field Communication (NFC) in an Automotive Environment
NFC '10 Proceedings of the 2010 Second International Workshop on Near Field Communication
NFC Mobile Transactions and Authentication Based on GSM Network
NFC '10 Proceedings of the 2010 Second International Workshop on Near Field Communication
A Generic NFC-enabled Measurement System for Remote Monitoring and Control of Client-side Equipment
NFC '11 Proceedings of the 2011 Third International Workshop on Near Field Communication
Encrypted NFC Emergency Tags Based on the German Telematics Infrastructure
NFC '11 Proceedings of the 2011 Third International Workshop on Near Field Communication
Security Vulnerabilities of the NDEF Signature Record Type
NFC '11 Proceedings of the 2011 Third International Workshop on Near Field Communication
Practical Attacks on NFC Enabled Cell Phones
NFC '11 Proceedings of the 2011 Third International Workshop on Near Field Communication
Designed to fail: a USB-Connected reader for online banking
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Ecosystem scenarios for cloud-based NFC payments
Proceedings of the Fifth International Conference on Management of Emergent Digital EcoSystems
Hi-index | 0.00 |
In this paper we propose a new solution for mobile payments called Tap2 technology. To use it, users need only their NFC-enabled mobile phones and credentials implemented on their smart cards. An NFC device acts like a bridge between service providers and secure elements and the secure credentials (on the card) are never revealed. In this way, secure authentication can be obtained by means of anonymous credentials, implemented on a smart card to provide the functionality with minimal data disclosure. We propose to use zero-knowledge proofs based on attribute-based anonymous credentials to provide the security and privacy requirements in mobile payments. Other use cases include online shopping, easy payment, eGoverment proofs etc.