Abstract
Electronic coupons booklets are the equivalent of paper-based coupons booklets, offered to customers as a great opportunity to obtain a better offer from merchants. In this book chapter, the authors describe the main coupons booklet scenarios and identify the basic and additional security requirements. They review the state-of-the-art of the coupons booklet solutions and discuss about the main challenges: security, privacy and efficiency. In order to solve all these challenges, they present a coupons booklet scheme for the mobile scenario. They analyze their proposal to prove it meets all security and privacy requirements, and provide some performance results to prove it is a viable solution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Chen, L., Enzmann, M., Sadeghi, A.-D., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: Proceedings of the 9th International Financial Cryptography and Data Security Conference (FC2005), Lecture Notes in Computer Science, vol. 3570, pp. 578–578. The Commonwealth Of Dominica, Springer, Roseau, Berlin, 28 Feb–3 Mar 2005
Nguyen, L.: Privacy-protecting coupon system revisited. In: Proceedings of the 10th Financial Cryptography and Data Security Conference (FC2006), Lecture Notes in Computer Science, vol. 4107, pp. 266–280. Paradise Cove, British West Indies, Springer, Anguilla, Berlin 27 Feb–2 Mar 2006
Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: 4th International Conference of Applied Cryptography and Network Security (ACNS2006), Lecture Notes in Computer Science, vol. 3989 , pp. 66–81. Springer, Singapore, Berlin 6–9 June 2006
Escalante, A.N., Löhr, H., Sadeghi, A.-R.: A non-sequential unsplittable privacy-protecting multi-coupon scheme. GI Jahrestagung 2, 184–188 (2007)
Chen, L., Escalante, A.N., Löhr, H., Manulis, M., Sadeghi. A.R.: A privacy-protecting multi-coupon scheme with stronger protection against splitting. In: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security (FC2007 and USEC2007), Lecture Notes in Computer Science, vol. 4886, pp. 29–44. Springer, Scarborough, Trinidad and Tobago, Berlin, 12–16 Feb 2007
Borrego-Jaraba, F., Garrido, P.C., Garcia, G.C., Ruiz, I.L., Gomez-Nieto, M.A.: Ubiquitous NFC solution for the development of tailored marketing strategies based on discount vouchers and loyalty cards. Sensors 13(5), 6334–6354 (2013)
Armknecht, F., Escalante, A.N., Löhr, H., Manulis, M., Sadeghi, A.-R.: Secure multi-coupons for federated environments: privacy-preserving and customer-friendly. In: Proceedings of the 4th International Conference on Information Security Practice and Experience (ISPEC2008). Lecture Notes in Computer Science, vol. 4991, pp. 29–44. Springer, Sydney, Australia, Berlin, 21–23 Apr 2008
Isern-Deya, A.-P., Hinarejos, M.F., Ferrer-Gomila, J.-L., Payeras-Capellà, M.: A secure multicoupon solution for multi-merchant scenarios. In: Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), pp. 655–663. IEEE, Changsha, China, New York, 16–18 Nov 2011
Liu X., Xu, Q.-L.: Practical compact multi-coupon systems. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2009), vol. 3, pp. 211–216. IEEE, Shanghai, China, Washington, 20–22 Nov 2009
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 83, vol. 82, pp. 199–203 (1983)
Abe, M., Fujisaki, E.: How to Date Blind Signatures. Asiacrypt’ 96. Lecture Notes in Computer Science, vol. 1666, pp. 244–251. Springer, Berlin (1996)
Abe, M., Okamoto, T.: Provably Secure Partially Blind Signatures. CRYPTO 2000. Lecture Notes in Computer Science, vol. 1880, pp. 271–286. Springer, Berlin (2000)
Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: RSA-based partially blind signature with low computation. In: Proceedings of the 8th International Conference on Parallel and Distributed Systems (ICPADS2001), pp. 385–389. IEEE, Kyongju City, South Korea, Washington, 26–29 June 2001
Chaum, D., van Heyst, E.: Group signatures. In: Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT’91, pp. 257–265. Springer, Brighton, UK, Berlin (1991)
Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. Advances in Cryptology–CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152, pp. 227–242. Springer, Berlin (2004)
Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04, pp. 168–177. ACM, New York, NY, USA (2004)
Furukawa, J.: An efficient group signature scheme from bilinear maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89(5), 1328–1338 (2006)
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 255–270. Springer, Berlin (2000)
Escalante, A.N.: Privacy-protecting multi-coupon schemes with stronger protection against splitting. Master’s Thesis. Department of Computer Science, Saarland University, Germany (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Hinarejos, M.F., Isern-Deyà, A.P., Ferrer-Gomila, JL. (2015). Privacy on Mobile Coupons Booklets. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-09885-2_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-09884-5
Online ISBN: 978-3-319-09885-2
eBook Packages: EngineeringEngineering (R0)