Skip to main content
Log in

Secure E-Coupons

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

As the Internet is getting easier and faster to use, electronic coupon (e-coupon) distribution is becoming a more and more popular advertising technique. E-coupons are the digital analogue of paper coupons which are used to provide customers with discounts or gift in order to incentive the purchase of some products. Nowadays, the potential of digital coupons has not been fully exploited on the web. This is mostly due to the lack of “efficient” techniques to handle the generation and distribution of e-coupons. In this paper we discuss models and protocols for e-coupons satisfying a number of security requirements. Furthermore we present a lightweight implementation of our protocol, which preserves the privacy of the users, since it does not require any registration phase.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Anand, R., M. Kumar, and A. Jhingran. (1999). “Distributing E-Coupons on the Internet.” In Proceedings of 9th Conference on Internet Society (INET'99), San Jose.

  2. Anupam, V., A. Mayer, K. Nissim, B. Pinkas, and M.K. Reiter. (1999). “On the Security of Pay-per-Click and other Web Advertising Schemes.” In Proceedings of 8th World Wide Web Conference (WWW8).

  3. Association of Coupon Professionals. (2001). “A Guide to Internet Coupons.”

  4. Blundo, C., A. De Bonis, and B. Masucci. (2000). “Metering Schemes with Pricing.” In M. Herlihy (ed.), Proceedings of 14th International Conference on Distributed Computing (DISC 2000), Toledo, Lecture Notes in Computer Science, Vol. 1914. Berlin: Springer.

    Google Scholar 

  5. Cimato, S. and A. De Bonis. (2001). “Online Advertising: Secure E-Coupons.” In L.R.A. Restivo and S. Ronchi Della Rocca (eds.), Proceedings of 7th Italian Conference on Theoretical Computer Science (ICTCS 2001), Lecture Notes in Computer Science, Vol. 2202. Berlin: Springer.

    Google Scholar 

  6. Coupon Information Corporation. (2001). “The Security Risks of Internet Print-at-Home Coupons.”

  7. Franklin, M. and D. Malkhi. (1997). “Auditable Metering with Lightweight Security.” In R. Hirschfeld (ed.), Financial Criptography (FC '97), Lecture Notes in Computer Science, Vol. 1318. Berlin: Springer, pp. 151–160.

    Google Scholar 

  8. Garg, R., P. Mittal, V. Agarwal, and N. Modani. (2001). “An Architecture for Secure Generation and Veri-fication of Electronic Coupons.” In Proceedings of 2001 USENIX Annual Technical Conference.

  9. Greenman, C. (1999). “The Trouble with Rebates.” New York Times.

  10. Haber, S. and W. Stornetta. (1991). “How to Time-Stamp a Digital Document.” Journal of Cryptology3(2), 99–111.

    Google Scholar 

  11. Jakobsson, M., P.D. MacKenzie, and J.P. Stern. (1999). “Secure and Lightweight Advertising on the Web.” In Proceedings of 8th World Wide Web Conference (WWW9).

  12. Joint Industry Coupon Committee. (1998). Coupons: A Complete Guide. Grocery Manufacturers of America.

  13. Menezes, A., P. van Oorschot, and S. Vanstone. (1996). Handbook of Applied Cryptography. CRC Press.

  14. Naor, M. and B. Pinkas. (1998). “Secure and Efficient Metering.” In K. Nyberg (ed.), Proceedings of Inter-national Conference on the Theory and Application of Cryptographic Techniques (Eurocrypt'98), Espoo, Finland, Lecture Notes in Computer Science, Vol. 1403. Berlin: Springer, pp. 576–590.

    Google Scholar 

  15. Slatalla, M. (1999). “Turning Coupon Users from Clippers into Clickers.” New York Times.

  16. Tedeschi, B. (1998). “Is Coupon Clicking the Next Advertising Trend? New York Times.

  17. Wolverton, T. (1998). “Disney Battles Coupon Goof.” CNET News.com.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Blundo, C., Cimato, S. & De Bonis, A. Secure E-Coupons. Electronic Commerce Research 5, 117–139 (2005). https://doi.org/10.1023/B:ELEC.0000045976.24984.48

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/B:ELEC.0000045976.24984.48

Navigation