Abstract
Electronic coupons (e-coupons) are a very effective marketing tool. In some scenarios, it is necessary to check some customer’s personal attributes at the redeeming phase (e.g. age, title, citizenship, etc.). But customers may be reluctant to use e-coupons if their privacy is in danger. Digital certificates and credentials could be suitable for validating customer attributes. However, a bad use of such electronic documents entails a loss of privacy, revealing more identity attributes than necessary. Here, we present the first secure protocol for e-coupons, achieving verification proofs of identity, with selective disclosure of customer’s certified attributes. On the other hand, our proposal meets other necessary security requirements, such as forging protection and double-redeem protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Coupon Savings Report (2016). https://www.nchmarketing.com/nchpressreleases.aspx. Accessed 17 Aug 2017
Terms and Conditions - Christmas promotion 31 days. https://app.mcdonalds.es/landing/legal/legal31DiasLocosNavidad.html. Accessed 17 Aug 2017
Kumar, M., Anand, R., Jhingran, A., Mohan, R.: Sales promotions on the Internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167–176, Boston (1998)
Jakobsson, M., Mackenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. J. Comput. Telecommun. Netw. 31(11), 1101–1109 (1999)
Chang, C.C., Wu, C.C., Lin, I.C.: A secure e-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273–280 (2006)
Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops, pp. 362–366, New York (2007)
Chang, C.C., Sun, C.Y.: A secure and efficient authentication scheme for e-coupon systems. Wirel. Pers. Commun. 77(4), 2981–2996 (2014)
Chang, C.C., Lin, I.C., Chi, Y.L.: Secure electronic coupons. In: Proceedings - 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, pp. 104–109 (2015)
Liu, W., Mu, Y., Yang, G., Yu, Y.: Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64, 695–708 (2017)
Camenisch, J., Mödersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198–214. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15898-8_13
Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36413-7_20
Acknowledgments
This work is partially financed by the European Social Fund and the Spanish Government under the projects TIN2014-54945-R and TIN2015-70054-REDC.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 IFIP International Federation for Information Processing
About this paper
Cite this paper
Conejero-Alberola, P., Hinarejos, M.F., Ferrer-Gomila, JL. (2018). A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons. In: Hancke, G., Damiani, E. (eds) Information Security Theory and Practice. WISTP 2017. Lecture Notes in Computer Science(), vol 10741. Springer, Cham. https://doi.org/10.1007/978-3-319-93524-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-93524-9_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-93523-2
Online ISBN: 978-3-319-93524-9
eBook Packages: Computer ScienceComputer Science (R0)