SmartPay: A Lightweight Protocol to Enforce Trust Preferences in Mobile Person-to-Person Payments

Barbara Carminati, Elena Ferrari, Ngoc Hong Tran

Abstract


The technological advancements in Internet speeds, increased computing power and smart phones have pushed the rise of new digital methods supporting mobile person-to-person (P2P) payments. Despite the growing interest in these new methods, we believe that, to fully enable this increasing rise of digital
wallets, there is the need for tools helping a person in judging the risk of a money transfer. For this purpose, this paper aims at exploiting social network connections. This is achieved by making payers/payees able to state their trust preferences with
respect to the potential payees/payers. Trust preference evaluation requires to nd social connections between a payer and a payee across, possible, different social network realms. We therefore propose a light cryptography protocol, specically targeted to mobile P2P payments, that besides providing good
performance, ensures user information privacy.

References


Gartner, "Gartner says worldwide mobile payment transaction

value to surpass usd 171:5 billion." http://www.gartner.com/newsroom/id/2028315, 2012.

B. of Governors of the Federal Reserve System, "Consumers and mobile nancial services 2013." http://www.federalreserve.gov/econresdata/

consumersandmobilenancialservicesreport-

pdf, 2013.

V. Katiyar, K. Dutta, and S. Gupta, "A survey on elliptic curve cryptography for pervasive computing environment," Int. Journal of Computer Applications, 2010.

J. Golbeck, "Personalizing applications through integration of inferred trust values in semantic web-based social networks," in Semantic Network Analysis Workshop co-located with ISWC'05, 2005.

B. Carminati, E. Ferrari, and N. H. Tran, "Enforcing trust preferences in mobile person-to-person payments," in IEEE International Conference on Information Privacy, Security, Risk

and Trust, 2013.

M. Tebaa, S. E. Hajji, and A. E. Ghazi, "Homomorphic encryption applied to the cloud computing security," in World Congress on Engineering (WCE 2012), 2012.

E. Mohamed, S. El-Etriby, and H. Abdul-kader, "Randomness testing of modern encryption techniques in cloud environment," in Informatics and Systems (INFOS), 2012.

D. Brickley and L. Miller, "Foaf vocabulary specication 0.98," 2010. http://xmlns.com/foaf/spec/.

B. King, "A point compression method for elliptic curves defined over gf(2n)," in Work. Theory and Practice in Public Key Cryptography, 2004.

B. King, "Mapping an Arbitrary Message to an Elliptic Curve when Dened over GF(2n)," Int. Journal of Network Security, vol. 8, no. 2, 2009.

P. Eagle, S. Galbraith, and J. Ong, "Point compression for koblitz elliptic curves," Advances in Mathematics of Communication, vol. 5, no. 1, 2011.

G. Liu, Y. Wang, and M. A. Orgun, "Trust transitivity in complex social networks," in AAAI Conference on Articial Intelligence, 2011.

L. Sweeney, "K-anonymity: A model for protecting privacy," Int. Journal on Uncertainty, Fuzziness and Knowledgebased Systems, vol. 10, no. 5, 2002.

A. Lenstra and E. Verheul, "Selecting cryptographic key sizes," Journal of Cryptology, vol. 14, 2001.

X. Mingqiang, B. Carminati, and E. Ferrari, "P3d - privacy-preserving path discovery in decentralized online social networks," in IEEE COMPSAC, 2011.

D. Hankerson and A. Menezes, Encyclopedia of Cryptography and Security (2nd Ed.), ch. NIST Elliptic Curves. searching, 2011.

I. Davis and V. J. E., "A vocabulary for describing relationships between people.", http://vocab.org/relationship/, 2013.

S. Nakamoto, "Bitcoin: A peertopeer electronic cash system.", http://bitcoin.org/bitcoin.pdf, 2009.

E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun, "Evaluating user privacy in bitcoin," in Financial Cryptography and Data Security, 2013.

I. Miers, C. Garman, M. Green, and A. D. Rubin, "Zerocoin: Anonymous distributed e-cash from bitcoin," in IEEE Symposium on Security and Privacy, 2013.

Ripple, "Ripple payment system.", https://ripple.com/.

J. Domingo Ferrer, "A public key protocol for social networks with private relationships," in Modeling Decisions for Articial Intelligence (MDAI), 2007.

J. Domingo Ferrer, A. Viejo, F. Sebe, and N. Gonzalez, "Privacy homomorphisms for social networks with private relationships," Journal of Computer Networks, vol. 52, no. 15, 2008.

G. Mezzour, A. Perrig, V. Gligor, and P. Pa-padimitratos, "Privacy-preserving relationship path discovery in social networks," in Cryptology and Network Security(CANS), 2009.


Full Text: PDF

Refbacks

  • There are currently no refbacks.