Guided Specification and Analysis of a Loyalty Card System

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9390)


We apply a graphical model to develop a digital loyalty program protocol specifically tailored to small shops with no professional or third-party-provided infrastructure. The graphical model allows us to capture assumptions on the environment the protocol is running in, such as capabilities of agents, available channels and their security properties. Moreover, the model serves as a manual tool to quickly rule out insecure protocol designs and to focus on improving promising designs. We illustrate this by a step-wise improvement of a crude but commercially used protocol to finally derive a light-weight and scalable security protocol with proved security properties and many appealing features for practical use.


Mobile Device Security Requirement Security Protocol Secure Channel Coffee Shop 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Abadi, M., Needham, R.M.: Prudent engineering practice for cryptographic protocols. IEEE Trans. Softw. Eng. 22(1), 6–15 (1996)CrossRefGoogle Scholar
  2. 2.
    ECB (European Central Bank). Virtual currency schemes, October 2012Google Scholar
  3. 3.
    Basin, D., Radomirović, S., Schläpfer, M.: A complete characterization of secure human-server communication. In: 28th IEEE Computer Security Foundations Symposium (CSF 2015), pp. 199–213. IEEE Computer Society (2015).
  4. 4.
    Blanco-Justicia, A., Domingo-Ferrer, J.: Privacy-preserving loyalty programs (2014). CoRR, abs/1411.3961Google Scholar
  5. 5.
    Canard, S., Gouget, A., Hufschmitt, E.: A handy multi-coupon system. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 66–81. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, New York (1983)CrossRefGoogle Scholar
  7. 7.
    Chen, L., Enzmann, M., Sadeghi, A.-R., Schneider, M., Steiner, M.: A privacy-protecting coupon system. In: S. Patrick, A., Yung, M. (eds.) FC 2005. LNCS, vol. 3570, pp. 93–108. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  8. 8.
    Cuennet, L.: Security protocols for loyalty card systems on mobile devices. Master’s thesis, University Of Fribourg (2014)Google Scholar
  9. 9.
    Cumby, C., Fano, A., Ghani, R., Krema, M.: Predicting customer shopping lists from point-of-sale purchase data. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 402–409. ACM (2004)Google Scholar
  10. 10.
    Dominikus, S., Aignerc, M.: mCoupons: an application for near field communication (NFC). In: 2007 21st International Conference on Advanced Information Networking and Applications Workshops, AINAW 2007, vol. 2, pp. 421–428. IEEE (2007)Google Scholar
  11. 11.
    Enzmann, M., Fischlin, M., Schneider, M.: A privacy-friendly loyalty system based on discrete logarithms over elliptic curves. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 24–38. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Maurer, U.M., Schmid, P.E.: A calculus for secure channel establishment in open networks. In: Gollmann, D. (ed.) ESORICS 1994. LNCS, vol. 875, pp. 173–192. Springer, Heidelberg (1994)CrossRefGoogle Scholar
  13. 13.
    Meier, S., Schmidt, B., Cremers, C., Basin, D.: The TAMARIN prover for the symbolic analysis of security protocols. In: Sharygina, N., Veith, H. (eds.) CAV 2013. LNCS, vol. 8044, pp. 696–701. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  14. 14.
    Pfitzmann, B., Waidner, M.: Properties of payment systems: general definiton sketch and classification (1996)Google Scholar
  15. 15.
    Quaresma, J.: On building secure communication systems. Ph.D. thesis, DTU Compute, Technical University of Denmark (2013)Google Scholar
  16. 16.
    Quaresma, J., Probst, C.W., Nielson, F.: The guided system development framework: modeling and verifying communication systems. In: Margaria, T., Steffen, B. (eds.) ISoLA 2014, Part II. LNCS, vol. 8803, pp. 509–523. Springer, Heidelberg (2014)Google Scholar
  17. 17.
    Radomirović, S.: Tamarin specification files for two loyalty points protocols (2015).
  18. 18.
    Sadeghi, A.-R., Schneider, M.: Electronic payment systems. In: Becker, E., Buhse, W., Günnewig, D., Rump, N. (eds.) Digital Rights Management. LNCS, vol. 2770, pp. 113–137. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  19. 19.
    Schoenmakers, B.: Basic security of the ecash payment system. In: Preneel, B., Rijmen, V. (eds.) Computer Security and Industrial Cryptography: State of the Art and Evolution, pp. 342–356. Springer Verlag, New York (1998)Google Scholar
  20. 20.
    Song, D., Perrig, A., Phan, D.: AGVI - automatic generation, verification, and implementation of security protocols. In: Berry, G., Comon, H., Finkel, A. (eds.) CAV 2001. LNCS, vol. 2102, pp. 241–245. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  21. 21.
    Sprankel, S: Technical basis of digital currencies (2013)Google Scholar
  22. 22.
    Sprenger, C., Basin, D.: Developing security protocols by refinement. In: 7th ACM Conference on Computer and Communications Security (CCS 2010), 4–8 October 2010, Chicago, USA, pp. 361–374. ACM (2010)Google Scholar
  23. 23.
    von Solms, S., Naccache, D.: On blind signatures and perfect crimes. Comput. Secur. 11, 581–583 (1992)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  1. 1.Department of InformaticsUniversity of FribourgFribourgSwitzerland
  2. 2.Lucerne University of Applied Sciences and ArtsLucerneSwitzerland
  3. 3.Department of Computer Science, Institute of Information SecurityETH ZürichZürichSwitzerland

Personalised recommendations