Advertisement

Abstract

We show how group discounts can be offered without forcing buyers to surrender their anonymity, as long as buyers can use their own computing devices (e.g. smartphone, tablet or computer) to perform a purchase. Specifically, we present a protocol for privacy-preserving group discounts. The protocol allows a group of buyers to prove how many they are without disclosing their identities. Coupled with an anonymous payment system, this makes group discounts compatible with buyer privacy (that is, buyer anonymity).

Keywords

Buyer privacy Group discounts Cryptographic protocols Digital signatures  

Notes

Acknowledgments

Thanks go to Dr Carla Ràfols for advice on IBDT signatures. The following funding sources are acknowledged: Google (Faculty Research Award to the first author), Government of Catalonia (ICREA Acadèmia Prize to the first author and grant 2014 SGR 537), Spanish Government (project TIN2011-27076-C03-01 “CO-PRIVACY”), European Commission (FP7 projects “DwB” and “Inter-Trust”) and Templeton World Charity Foundation (grant TWCF0095/AB60 “Co-Utility”). The authors are with the UNESCO Chair in Data Privacy. The views in this paper are the authors’ own and do not necessarily reflect the views of Google, UNESCO or the Templeton World Charity Foundation.

References

  1. 1.
    Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, pp. 313–317. AFIPS Press, New York (1979)Google Scholar
  2. 2.
    Bluetooth SIG, Specification of the Bluetooth System (2013). https://www.bluetooth.org/en-us/specification/adopted-specifications
  3. 3.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, p. 213. Springer, Heidelberg (2001) CrossRefGoogle Scholar
  4. 4.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990) CrossRefGoogle Scholar
  5. 5.
    Domingo-Ferrer, J., Ràfols, C., Aragonès-Vilella, J.: Method and system for customized contactless toll collection in carpool lanes (in Spanish “Método y sistema de cobro sin contacto, por el uso de una vía, para vehículos de alta ocupación”), Spanish patent ref. no: P201200215. Date filed: February 28, 2012. Patent owner: Universitat Rovira i VirgiliGoogle Scholar
  6. 6.
    Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  7. 7.
    Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: 2013 IEEE Symposium on Security and Privacy (SP), pp. 397–411. IEEE (2013)Google Scholar
  8. 8.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted, vol. 1 (2008). http://www.bitcoin.org/bitcoin.pdf
  9. 9.
    Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013) CrossRefGoogle Scholar
  10. 10.
    Shamir, A.: How to Share a Secret. Commun. ACM 22, 612–613 (1979)CrossRefzbMATHMathSciNetGoogle Scholar
  11. 11.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985) CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Department of Computer Engineering and MathematicsUniversitat Rovira i VirgiliTarragonaSpain

Personalised recommendations