A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons

  • Pau Conejero-AlberolaEmail author
  • M. Francisca Hinarejos
  • Josep-Lluís Ferrer-Gomila
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10741)


Electronic coupons (e-coupons) are a very effective marketing tool. In some scenarios, it is necessary to check some customer’s personal attributes at the redeeming phase (e.g. age, title, citizenship, etc.). But customers may be reluctant to use e-coupons if their privacy is in danger. Digital certificates and credentials could be suitable for validating customer attributes. However, a bad use of such electronic documents entails a loss of privacy, revealing more identity attributes than necessary. Here, we present the first secure protocol for e-coupons, achieving verification proofs of identity, with selective disclosure of customer’s certified attributes. On the other hand, our proposal meets other necessary security requirements, such as forging protection and double-redeem protection.


E-coupon Security Identity Privacy 



This work is partially financed by the European Social Fund and the Spanish Government under the projects TIN2014-54945-R and TIN2015-70054-REDC.


  1. 1.
    Coupon Savings Report (2016). Accessed 17 Aug 2017
  2. 2.
    Terms and Conditions - Christmas promotion 31 days. Accessed 17 Aug 2017
  3. 3.
    Kumar, M., Anand, R., Jhingran, A., Mohan, R.: Sales promotions on the Internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167–176, Boston (1998)Google Scholar
  4. 4.
    Jakobsson, M., Mackenzie, P.D., Stern, J.P.: Secure and lightweight advertising on the web. J. Comput. Telecommun. Netw. 31(11), 1101–1109 (1999)CrossRefGoogle Scholar
  5. 5.
    Chang, C.C., Wu, C.C., Lin, I.C.: A secure e-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273–280 (2006)Google Scholar
  6. 6.
    Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops, pp. 362–366, New York (2007)Google Scholar
  7. 7.
    Chang, C.C., Sun, C.Y.: A secure and efficient authentication scheme for e-coupon systems. Wirel. Pers. Commun. 77(4), 2981–2996 (2014)CrossRefGoogle Scholar
  8. 8.
    Chang, C.C., Lin, I.C., Chi, Y.L.: Secure electronic coupons. In: Proceedings - 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, pp. 104–109 (2015)Google Scholar
  9. 9.
    Liu, W., Mu, Y., Yang, G., Yu, Y.: Efficient E-coupon systems with strong user privacy. Telecommun. Syst. 64, 695–708 (2017)CrossRefGoogle Scholar
  10. 10.
    Camenisch, J., Mödersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198–214. Springer, Heidelberg (2010). Scholar
  11. 11.
    Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161–174 (1991)CrossRefGoogle Scholar
  12. 12.
    Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003). Scholar

Copyright information

© IFIP International Federation for Information Processing 2018

Authors and Affiliations

  • Pau Conejero-Alberola
    • 1
    Email author
  • M. Francisca Hinarejos
    • 1
  • Josep-Lluís Ferrer-Gomila
    • 1
  1. 1.University of the Balearic IslandsPalmaSpain

Personalised recommendations