Font Size: a A A

Research On Authentication Technology In Near Field Communication

Posted on:2019-11-09Degree:MasterType:Thesis
Country:ChinaCandidate:C B LiuFull Text:PDF
GTID:2428330575950890Subject:Information security
Abstract/Summary:PDF Full Text Request
People are paying more and more attention to personal privacy and personal safety.However,in reality,many businesses neglect the management and protection of their personal information.For example,on the delivery list,the user's personal information is displayed in a plaintext form.Some researchers use fragmented encryption to prevent information leakage caused by excess information.In fragmented encryption,there is a problem of high encryption complexity or high installation cost or obviously divided.Due to the appearance of host-based card emulation(HCE)mode,related applications are more easily developed and rapidly growing in number.However,in HCE,the security of data and the reliability of identity authentication are widely questioned.This poses a threat to the user's information security.Therefore,for the protection of personal information and privacy,this paper has carried out the following research work:(1)This paper presents a method based on three-dimensional points matrix section encryption for the problem of high complexity,high cost and obvious blocks in fragmented encryption.By setting a cube with enough three-dimensional points,each piece of information is converted into specific three-dimensional points as data into the corresponding section to comply the encryption of information,and the section equation is used as the key.The decryption is to reconstruct the section with the key,which is used to filter three-dimensional points in the cube.The filtered data is then restored to the piece of information.Thus,it is efficient to encrypt the information that needs to be fragmented to prevent the information leakage caused by the excess information.(2)This paper proposes a method of identity authentication based on zero-knowledge proof for the problem of data security,lack of communication security issues in HCE mode,in which the user can complete identity authentication without presenting proof of identity.By using the probabilistic characteristics of zero-knowledge proof,we designed a method to store the credentials scattered in the remaining storage space of the device.Location indexes are stored only in the cloud.Therefore,the local credentials are hidden,the security of local data is improved,and reducing the dependence on local device security.Through the cloud control,we can ask random part of the credentials to improve the randomness of zero knowledge proof.As a result,the zero-knowledge proof of identity authentication is more suitable for HCE mode.(3)This paper takes delivery service as a case to illustrate the application value and broad prospect of authentication protocol of near field communication.Replaced paper delivery list with NFC device,so that the user's personal information is not exposed in plaintext form.Through the method based on the three-dimensional points matrix section encryption method,the information on the delivery list can be encrypted and decrypted efficiently.Through the zero-based knowledge of identity authentication method to verify the user identity,so that users can prevent such issues as fake signatures.The application case analysis shows the feasibility,efficiency and security of three-dimensional points matrix section encryption,and the security and applicability of identity authentication based on zero-knowledge proof in HCE mode.They can improve work efficiency in the actual use represented by delivery service.At the same time to better protect the user's personal information...
Keywords/Search Tags:Near Field Communication, identity authentication, privacy protection, three-dimensional points matrix section encryption, zero-knowledge proof
PDF Full Text Request
Related items