Breaking and Fixing Unlinkability of the Key Agreement Protocol for 2nd Gen EMV Payments

05/05/2021
by   Ross Horne, et al.
0

To address privacy problems with the EMV standard, EMVco proposed a Blinded Diffie-Hellman key establishment protocol. We point out that active attackers were not previously accounted for in the privacy requirements of this proposed protocol, despite the fact that an active attacker can compromise unlinkability. Here, we adopt a strong definition of unlinkability that does account for active attackers and propose an enhancement of the protocol proposed by EMVco where we make use of Verheul certificates. We prove that our protocol does satisfy strong unlinkability, while preserving authentication.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/21/2019

The Saeed-Liu-Tian-Gao-Li authenticated key agreement protocol is insecure

A recently proposed authenticated key agreement protocol is shown to be ...
research
07/13/2022

On Post-Quantum Perfect Forward Secrecy in 6G

The standardized Authentication and Key Agreement protocol for 5G networ...
research
04/09/2021

A Novel Provably Secure Key Agreement Protocol Based On Binary Matrices

In this paper, a new key agreement protocol is presented. The protocol u...
research
10/02/2019

Sensor Networks in Healthcare: Ensuring Confidentiality and User Anonymity in WBAN

Wireless body area network(WBAN) is becoming more popular in recent year...
research
05/02/2019

Passive and active attackers in noiseless privacy

Differential privacy offers clear and strong quantitative guarantees for...
research
12/30/2022

Detecting Forged Kerberos Tickets in an Active Directory Environment

Active Directory is the most popular service to manage users and devices...
research
12/05/2021

SCMCI: Secured Click and Mortar Commercial Interaction

The wide spread of click-and-mortar model offers an opportunity to consi...

Please sign up or login with your details

Forgot password? Click here to reset