A Selective Privacy-Preserving Identity Attributes Protocol for Electronic Coupons
Electronic coupons (e-coupons) are a very effective marketing tool. In some scenarios, it is necessary to check some customer’s personal attributes at the redeeming phase (e.g. age, title, citizenship, etc.). But customers may be reluctant to use e-coupons if their privacy is in danger. Digital certificates and credentials could be suitable for validating customer attributes. However, a bad use of such electronic documents entails a loss of privacy, revealing more identity attributes than necessary. Here, we present the first secure protocol for e-coupons, achieving verification proofs of identity, with selective disclosure of customer’s certified attributes. On the other hand, our proposal meets other necessary security requirements, such as forging protection and double-redeem protection.
KeywordsE-coupon Security Identity Privacy
This work is partially financed by the European Social Fund and the Spanish Government under the projects TIN2014-54945-R and TIN2015-70054-REDC.
- 1.Coupon Savings Report (2016). https://www.nchmarketing.com/nchpressreleases.aspx. Accessed 17 Aug 2017
- 2.Terms and Conditions - Christmas promotion 31 days. https://app.mcdonalds.es/landing/legal/legal31DiasLocosNavidad.html. Accessed 17 Aug 2017
- 3.Kumar, M., Anand, R., Jhingran, A., Mohan, R.: Sales promotions on the Internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167–176, Boston (1998)Google Scholar
- 5.Chang, C.C., Wu, C.C., Lin, I.C.: A secure e-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273–280 (2006)Google Scholar
- 6.Aigner, M., Dominikus, S., Feldhofer, M.: A system of secure virtual coupons using NFC technology. In: Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops, pp. 362–366, New York (2007)Google Scholar
- 8.Chang, C.C., Lin, I.C., Chi, Y.L.: Secure electronic coupons. In: Proceedings - 10th Asia Joint Conference on Information Security, AsiaJCIS 2015, pp. 104–109 (2015)Google Scholar