Skip to main content

Privacy on Mobile Coupons Booklets

  • Chapter
  • First Online:
Advanced Research in Data Privacy

Abstract

Electronic coupons booklets are the equivalent of paper-based coupons booklets, offered to customers as a great opportunity to obtain a better offer from merchants. In this book chapter, the authors describe the main coupons booklet scenarios and identify the basic and additional security requirements. They review the state-of-the-art of the coupons booklet solutions and discuss about the main challenges: security, privacy and efficiency. In order to solve all these challenges, they present a coupons booklet scheme for the mobile scenario. They analyze their proposal to prove it meets all security and privacy requirements, and provide some performance results to prove it is a viable solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Chen, L., Enzmann, M., Sadeghi, A.-D., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: Proceedings of the 9th International Financial Cryptography and Data Security Conference (FC2005), Lecture Notes in Computer Science, vol. 3570, pp. 578–578. The Commonwealth Of Dominica, Springer, Roseau, Berlin, 28 Feb–3 Mar 2005

    Google Scholar 

  2. Nguyen, L.: Privacy-protecting coupon system revisited. In: Proceedings of the 10th Financial Cryptography and Data Security Conference (FC2006), Lecture Notes in Computer Science, vol. 4107, pp. 266–280. Paradise Cove, British West Indies, Springer, Anguilla, Berlin 27 Feb–2 Mar 2006

    Google Scholar 

  3. Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: 4th International Conference of Applied Cryptography and Network Security (ACNS2006), Lecture Notes in Computer Science, vol. 3989 , pp. 66–81. Springer, Singapore, Berlin 6–9 June 2006

    Google Scholar 

  4. Escalante, A.N., Löhr, H., Sadeghi, A.-R.: A non-sequential unsplittable privacy-protecting multi-coupon scheme. GI Jahrestagung 2, 184–188 (2007)

    Google Scholar 

  5. Chen, L., Escalante, A.N., Löhr, H., Manulis, M., Sadeghi. A.R.: A privacy-protecting multi-coupon scheme with stronger protection against splitting. In: Proceedings of the 11th International Conference on Financial Cryptography and 1st International Conference on Usable Security (FC2007 and USEC2007), Lecture Notes in Computer Science, vol. 4886, pp. 29–44. Springer, Scarborough, Trinidad and Tobago, Berlin, 12–16 Feb 2007

    Google Scholar 

  6. Borrego-Jaraba, F., Garrido, P.C., Garcia, G.C., Ruiz, I.L., Gomez-Nieto, M.A.: Ubiquitous NFC solution for the development of tailored marketing strategies based on discount vouchers and loyalty cards. Sensors 13(5), 6334–6354 (2013)

    Google Scholar 

  7. Armknecht, F., Escalante, A.N., Löhr, H., Manulis, M., Sadeghi, A.-R.: Secure multi-coupons for federated environments: privacy-preserving and customer-friendly. In: Proceedings of the 4th International Conference on Information Security Practice and Experience (ISPEC2008). Lecture Notes in Computer Science, vol. 4991, pp. 29–44. Springer, Sydney, Australia, Berlin, 21–23 Apr 2008

    Google Scholar 

  8. Isern-Deya, A.-P., Hinarejos, M.F., Ferrer-Gomila, J.-L., Payeras-Capellà, M.: A secure multicoupon solution for multi-merchant scenarios. In: Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom2011), pp. 655–663. IEEE, Changsha, China, New York, 16–18 Nov 2011

    Google Scholar 

  9. Liu X., Xu, Q.-L.: Practical compact multi-coupon systems. In: IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS2009), vol. 3, pp. 211–216. IEEE, Shanghai, China, Washington, 20–22 Nov 2009

    Google Scholar 

  10. Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 83, vol. 82, pp. 199–203 (1983)

    Google Scholar 

  11. Abe, M., Fujisaki, E.: How to Date Blind Signatures. Asiacrypt’ 96. Lecture Notes in Computer Science, vol. 1666, pp. 244–251. Springer, Berlin (1996)

    Google Scholar 

  12. Abe, M., Okamoto, T.: Provably Secure Partially Blind Signatures. CRYPTO 2000. Lecture Notes in Computer Science, vol. 1880, pp. 271–286. Springer, Berlin (2000)

    Google Scholar 

  13. Chien, H.-Y., Jan, J.-K., Tseng, Y.-M.: RSA-based partially blind signature with low computation. In: Proceedings of the 8th International Conference on Parallel and Distributed Systems (ICPADS2001), pp. 385–389. IEEE, Kyongju City, South Korea, Washington, 26–29 June 2001

    Google Scholar 

  14. Chaum, D., van Heyst, E.: Group signatures. In: Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques, EUROCRYPT’91, pp. 257–265. Springer, Brighton, UK, Berlin (1991)

    Google Scholar 

  15. Boneh, D., Boyen, X., Shacham, H.: Short Group Signatures. Advances in Cryptology–CRYPTO 2004. Lecture Notes in Computer Science, vol. 3152, pp. 227–242. Springer, Berlin (2004)

    Google Scholar 

  16. Boneh, D., Shacham, H.: Group signatures with verifier-local revocation. In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS ’04, pp. 168–177. ACM, New York, NY, USA (2004)

    Google Scholar 

  17. Furukawa, J.: An efficient group signature scheme from bilinear maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89(5), 1328–1338 (2006)

    Article  Google Scholar 

  18. Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Advances in Cryptology—CRYPTO 2000, Lecture Notes in Computer Science, vol. 1880, pp. 255–270. Springer, Berlin (2000)

    Google Scholar 

  19. Escalante, A.N.: Privacy-protecting multi-coupon schemes with stronger protection against splitting. Master’s Thesis. Department of Computer Science, Saarland University, Germany (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Francisca Hinarejos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Hinarejos, M.F., Isern-Deyà, A.P., Ferrer-Gomila, JL. (2015). Privacy on Mobile Coupons Booklets. In: Navarro-Arribas, G., Torra, V. (eds) Advanced Research in Data Privacy. Studies in Computational Intelligence, vol 567. Springer, Cham. https://doi.org/10.1007/978-3-319-09885-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-09885-2_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-09884-5

  • Online ISBN: 978-3-319-09885-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics