Abstract
In recent years, the incorporation of NFC (Near Field Communication) technology into mobile devices has led to changes in payment system environments. Currently, the NFC mobile payment service is leading the mobile payment market. In particular, most electronic payment services, such as those used by Google Inc. and Apple Inc., are adopting payment methods based on NFC to replace credit cards. In addition, related groups from the Republic of Korea have enhanced safety in communication by using standard techniques for activating NFC services. However, various security threats are still present in electronic payment methods that use NFC. In this paper, we propose a mutual authentication scheme based on a lattice for conditional anonymity in NFC-PCM (Near Field Communication-Passive Communication Mode) payment services environments.
1. Introduction
The inclusion of NFC (Near Field Communication) technology in mobile devices has resulted in changes in payment system environments that have been maintained over the past few years. As a result, payment methods based on NFC are currently leading the mobile payment market. In particular, companies such as Google, Apple, and Samsung have established new mobile payment services that have attracted attention as the means for replacing preexisting payment methods requiring the use of credit cards. Currently, most mobile payment services provide such services through the FIDO (Fast Identity Online) standard and tokenization technology. FIDO enables secure communication between mobile devices using wireless communication technology and supports the use of NFC. The disadvantage of mobile payment services is that such services cannot be used when the power is interrupted. Therefore, industry and academia have been conducting research on payment services that use NFC-PCM (Near Field Communication-Passive Communication Mode).
In payment services that use PCM, NFC tags draw their operating power from the electromagnetic field received from the reader of the NFC initiating device. A problem that might be encountered with this method would be low computing power and limited storage space in the NFC device. In particular, if the NFC-based device used in the payment service environment operates only through XOR, AND, and add operations, providing security for payment information might be difficult. Therefore, research that resolves this problem is understandably urgent. In recent years, many incidents related to privacy have occurred. Accordingly, companies that provide online services are demanding the appropriate level of information required to render the particular service they provide. That is, some companies do not require user information; for example, when registering in some domestic portal sites, these sites do not require social security numbers and may prefer to discard the social security numbers they have collected. Thus, personal information has emerged as an important social issue. Given the importance of privacy, problems associated with the disclosure of financial information can be seen as significant. According to the “Final Report of Measures on NFC Personal Information Protection” published by the Korea Internet and Security Agency, the information used for an NFC mobile credit card payment is collected and stored at shops, VAN (value-added network) companies, and card companies through networks. Thus, if POS (point-of-sale) terminals in shops are hacked, personal financial information can be stolen. In one case, the credit card information of almost 100,000 persons was leaked via the aforementioned attack method [1]. Even if an encryption algorithm with high cryptographic strength were to be applied, user identification or financial information could be exposed to a variety of attacks. Therefore, it is necessary to consider the application of anonymous authentication techniques that do not expose sensitive personal information.
Anonymous authentication technology is a type of technology that proves that the relevant parties have reasonable qualifications without the need for these parties to share any privacy information. Initial anonymous authentication technology was mainly utilized for the use of electronic money exchange or electronic voting. In recent years, research has been conducted on authentication methods for protecting personal information. Anonymous authentication techniques can distinguish between users depending on the level of anonymity provided by each technique. The anonymity level is determined by the availability of related information and the degree of anonymity required. In addition, related information can be divided into two categories: identifying information and connection information. Identifiable information is the information used by individuals who want to identify themselves, such as their name, social security number, and email address. Connection information is the information related to party-certification process handling. Examples of connection information are PKI-based digital signatures, where the name listed in the certificate can be considered an identity. The signature value generated from using the certificate cannot be easily decrypted by the user. Instead, the use of a signature value would require the generation of the same key to enable the recipient to access the connection information. Ki et al. [2] composed an anonymity level in six steps in order to separate the two types of information into complete, conditional, and no exposure. In this paper, we propose a new mutual user authentication scheme for privacy detection in NFC-PCM mobile payment environments. The remainder of this paper is organized as follows. Section 2 presents background research on lightweight NFC authentication for low-cost environments and NFC operating modes. Section 3 provides an analysis of the security requirements of NFC payment services. Section 4 proposes lightweight mutual authentication for NFC-PCM environments. Section 5 presents the security requirements and our analysis of the proposed scheme, and Section 6 concludes the paper.
2. Related Work
In this section, we describe related authentication schemes based on NFC operating modes and low-cost NFC authentication methods.
2.1. NFC Operating Modes
NFC is generally divided into PCM and ACM (Active Communication Mode). PCM is a method that enables a passive target device (e.g., an RFID tag) to respond to the initiator of the communication by using operating power obtained from the electromagnetic field provided by the initiator. In contrast, ACM is a method that enables communication between an initiator and a target device, both of which must be ACM-enabled such that both devices actively generate their own RF field on an alternating basis when communicating. While the target device waits for the initiator to send data through ACM, its RF field is temporarily deactivated. NFC-enabled devices can operate in three different communication modes, as depicted in the illustration in Figure 1. However, NFC mobile payment environments are required for payment services that use PCM-based NFC payment services. Nevertheless, PCM-based NFC mobile services are unsafe and can lead to privacy breaches.

NFC communication modes.
Our research focuses on PCM-based mutual authentication in low-cost NFC payment environments.
2.2. Business Models
The “LoopPay” solution is a solution for processing payments via electromagnetic waves in a noncontact manner, unlike traditional magnetic cards. It was developed in the US by the start-up company “LoopPay”, and the service is currently restricted to the United States. The characteristic of “LoopPay” is its ability to store multiple groups of plastic cards on one small payment device. It is known to be developed in a separate H/W and S/W system and is relatively safe in terms of security incidents. However, the internal structure of the system is not known. The COIN service was developed by the company “Only Coin” in San Francisco and is used in a similar manner as “LoopPay.” Such services are an example of the business model proposed in the present study.
2.3. Threat Models
Various studies [3, 4] have exposed security threats in the NFC service environment. In particular, the vulnerability of this study environment is attributable to the use of modulated NDEF (NFC Data Exchange Format) data. The exploitation of this vulnerability for attacks is possible because the user is required to make visual decisions. Accordingly, it is impossible to verify the reliability of a tag that is used to perform the payment. It would be possible to identify a genuine tag through the use of an authentication infrastructure and digital signature of an acceptable standard. However, this approach would be costly. Threats to which an NFC tag-based service is exposed are shown in Figure 2. Therefore, an NFC-PCM-based scheme should offer protection against the following security threats [5].

NFC tag attack scenario.
2.4. Related Work on Low-Cost NFCs
In most RFID application service environments, passive tags cannot easily perform complex calculations because of their limited processing capability. Consequently, a hash function-based protocol and lightweight cryptosystem technology have been proposed for solving the security and privacy issues of low-end RFID systems. Kaya et al., Batina et al., and Lee et al. [6–8] proposed an elliptic curve cryptography-based RFID authentication protocol. However, their proposal did not prove whether actual implementation is possible. In addition, their proposed methods have not been accepted by both NFC standards, and thus they are practically impossible to implement because of efficiency issues in RFID environments. In authentication studies conducted by Sekino et al. [9], the passive tag was enabled such that it has the ability to support the hash function to store information in large matrices and perform matrix operations. However, this method cannot be easily applied to a low-cost tag. Moreover, attackers can perform denial-of-service attacks on tags in low-cost environments. In particular, NFC storage, which accounts for high costs in terms of hardware, acts as a very important part of the same problems indicated above.
2.4.1. Jung
Jung [10] indicated that there is a risk for disguised attacks because user payment information remains on the tag reader. For low-cost NFC environments, Jung proposed an authentication mechanism that reduces the amount of computation through the use of the hash function and XOR operations. The objective of their proposed method was to employ the nonce value to prevent replay attacks. Because the nonce value changes in every session, the communication between devices is secured. However, the results from the XOR operations and simple hash function cannot easily provide safety to payment environments. Satisfying the various security requirements in payment environments is difficult. In addition, various similar studies were carried out, but their methods are not suitable for application in the NFC-PCM payment service environment [1, 11, 12].
2.4.2. Abughazalah et al.
Abughazalah et al. [13] proposed a protocol for the CasperFDR method that protects personal information and stores key information into the cloud. Their approach was to apply encryption using a certificate for the data exchange phase of every step of the protocol. However, this method is much less efficient in payment environments compared to nonpayment environments, and it is not applicable to the PCM environments proposed in this study.
2.5. NTRU
NTRU was proposed by Jeffrey Hoffstein during the Crypto Lump session of 1996. The public-key encryption scheme used by NTRU is based on a lattice problem. The basic operation is composed of a polynomial ring; the scheme was designated as a public-key encryption standard by IEEE as P1363.1. NTRU provides stability comparable to RSA and ECC, and its encryption and decryption speed is high (Table 1). Therefore, NTRU encryption technology is highly suitable for USN environments and devices with limited computational abilities that require lightweight encryption algorithms. ASC X9 in the United States has been designated as the standard with X.9.98 NTRUEncrypt for financial transaction data protection.
NTRU key features.
3. Security Requirements
NFC payment services should be provided with user authentication, integrity, and confidentiality functions in order to exchange data with external devices [10]. In addition, we need to consider the operational efficiency and safety of existing methods for PCM-based NFC environments. Therefore, our proposed scheme should satisfy the basic low-cost tag payment service security requirements of PCM-based NFC mobile payment environments. These requirements are as follows [14, 15].
Confidentiality. Because the data used for communication include sensitive billing information, only the legitimate communication object must be able to share this data. Even if sensitive data are exposed, an attacker should not be able to infer the value of the data. Integrity. It should not be possible to easily forge the data transmitted during communication because such data are the basis for financial transactions, for example, billing. Conditional Anonymous. The verifier should not need a separate verification protocol to be able to determine the personal information. Mutual Authentication. The idea is to provide mutual authentication of both communicating parties for legitimate user verification. Safety. The idea is to satisfy basic requirements by providing a mutual authentication protocol and to maintain a high level of safety when communicating secret information. Efficiency. The idea is to provide high efficiency in terms of the amount of computation required by devices with limited computational abilities.
4. Proposed Schemes
In this section, we use the characteristics of the convolution multiplication operation of a polynomial to propose a lattice-based mutual authentication scheme for low-cost NFC-PCMs.
Our approach involves changing the method according to which the polynomials f, g are generated to create the user's secret key. The existing NTRU method chooses two small polynomials f, g from the truncated polynomial ring r; however, the existing method only calculated the inverse of f, whereas the proposed protocol requires the inverse of g. The parameter setting that was used for selecting f was also applied for selection of the precise small polynomial when g was generated.
4.1. System Parameters
The system parameters used in the proposed scheme are as follows:
∗: object (A: user, B: bank or electronic payees), Z: set of integers, g: group generator (primitive root), I: the user's identity, p: prime (1024 bits),
4.2. Registration Phase
During initial registration, the user would be required to perform the steps indicated below on a dedicated application (app). The user uses the app to store their payment card information in the NFC tag. This information can later be changed if necessary. If the user's smartphone is shut down, it would be possible to use a credit card through the PCM that was set last. The following example considers a situation in which a user registers their mobile device with the bank to set up the device for making future payments.
Step 1.
The user chooses the secure key
Step 2.
The user submits the user information and user public key
4.3. User Verifying Phase
The user performs the steps indicated below in order to prove that he/she has valid financial payment information during financial transactions.

Proposed scheme.
Step 1.
The user selects a random polynomial
Step 2.
The bank verifies the validity of identity I and user public key
Step 3.
The user computes y through
Mathematical Background. Consider the following:
Step 4.
The bank verifies the user's identity by checking whether
4.4. Bank Authentication and Key Update Phase
The bank performs the steps indicated below in order to prove that it was the object of legitimate users. In this procedure, the bank generates new verification information based on user information by conducting the verification method provided in Step 4 in Section 4.3 and delivers the verification information to the user. Moreover, the user verifies the communication object that employs the information received from the bank.
Step 1.
The bank transmits the verification information to the user using
Step 2.
The user verifies
5. Proposed Scheme Analysis
Our proposed scheme satisfies the following requirements (see Table 2).
Confidentiality. The attacker cannot know encrypted Integrity. Data are delivered with certificate Mutual Authentication. Our idea is to provide mutual authentication through verification of the NTRU-based public key and Conditional Anonymity. Banks are required to calculate the inverse permutation for each piece of encrypted information in order to find the legal user. In our proposed scheme, the probability of the attacker finding the user information is Safety. The problems associated with finding confidential information about a user are equal to the math problem SVP (Shortest Vector Problem) that finds the shortest vector in a large-sized lattice. Therefore, the proposed method should satisfy the properties of the trapdoor function. In addition, even if g were to be exposed, an attacker capable of generating secret information would have to know the inverse function of one of the Efficiency. The exponentiation method used in the conventional method is rooted in the discrete logarithm problem. In contrast, our proposed method is based on the lattice problem. In addition, our idea is very efficient in terms of computational complexity because it performs only a simple addition, rotation function, NTRU (convolution multiplication), and hash operation. The feasibility of the method proposed in this paper is based on research suggested by Atici et al. [17]. These authors proved that the NTRU cryptosystem only requires 10.5 kgates for implementation. This is similar to the gate count used to implement a hash function. Therefore, our proposed approach can be used in practical low-cost tag environments.
Analysis of proposed scheme.
×: no offer, insecure, △: usually offer, ○: offer, secure
E: symmetric key; H: hash algorithm; U: public key; X: convolution multiplication; and A: addition, ⊕: XOR, and R: rotate functions.
6. Conclusions
In this paper, we proposed a mutual lattice-based authentication scheme for secure financial payment services in NFC-PCM payment environments. Although this method is similar to those proposed in previous studies, it is comparatively efficient in terms of computational complexity because most of the proposed operations use lattice-based convolution multiplication.
In particular, our proposed method provides a level of safety that is similar to that of the public key-based scheme used in previous studies. Our approach provides safety by using the CVP (Closest Vector Problem) to find the closest vector problem and SVP to find the shortest vector in a large-sized lattice. Our proposed method satisfied the conditions NP-hard. Only a BFA (Brute Force Attack) would be possible on devices using our approach. Our method was shown to provide very high efficiency in payment environments using the passive communication mode of NFC.
Footnotes
Competing Interests
The authors declare that they have no competing interests.
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the MEST (Ministry of Education, Science and Technology) (2013R1A1A2012940) and by the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the ITRC (Information Technology Research Center) Support Program (IITP-2016-R0992-16-1006) supervised by the IITP (Institute for Information & Communications Technology Promotion).
