[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/511446.511517acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
Article

A lightweight protocol for the generation and distribution of secure e-coupons

Published: 07 May 2002 Publication History

Abstract

A form of advertisement which is becoming very popular on the web is based on electronic coupon (e-coupon) distribution. E-coupons are the digital analogue of paper coupons which are used to provide customers with discounts or gift in order to incentive the purchase of some products. Nowadays, the potential of digital coupons has not been fully exploited on the web. This is mostly due to the lack of "efficient" techniques to handle the generation and distribution of e-coupons. In this paper we discuss models and protocols for e-coupons satisfying a number of security requirements. Our protocol is lightweight and preserves the privacy of the users, since it does not require any registration phase.

References

[1]
R. Anand, M. Kumar, and A. Jhingran. Distributing e-coupons on the Internet. In 9th Conference on Internet Society (INET '99), San Jose, 1999.]]
[2]
R. Anand, M. Kumar, A. Jhingran, and R. Mohan. Sales promotions on the Internet. In Third Usenix Workshop on E-Commerce, Boston, 1998.]]
[3]
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaways. UMAC: Fast and Secure Message Authentication. In Advances in Cryptology - CRYPTO '99. Lecture Notes in Computer Science, pages 216--233, vol. 1666, Springer-Verlag, 1999.]]
[4]
C. Blundo, A. De Bonis, and B. Masucci. Metering schemes with pricing. In M. Herlihy, editor, 14th International Conference on Distributed Computing (DISC 2000), volume 1914 of Lecture Notes in Computer Science, 2000. Springer-Verlag, Berlin.]]
[5]
S. Cimato and A. De Bonis. Online advertising: secure e-coupons. In A. Restivo, S. Ronchi Della Rocca, L. Roversi editor, 7th Italian Conference on Theoretical Computer Science (ICTCS 2001), volume 2202 of Lecture Notes in Computer Science, Torino, Italy 2001. Springer-Verlag, Berlin.]]
[6]
M. Franklin and D. Malkhi. Auditable metering with lightweight security. In R. Hirschfeld, editor, Financial Cryptography (FC '97), volume 1318 of Lecture Notes in Computer Science, pages 151--160. Springer-Verlag, Berlin, 1997.]]
[7]
R. Garg, P. Mittal, V. Agarwal, N. Modani. An Architecture for Secure Generation and Verification of Electronic Coupons. In Proceedings of 2001 USENIX Annual Technical Conference, Boston, Massachusetts, USA.]]
[8]
S. Haber and W. S. Stornetta. How to time-stamp a digital document. Journal of Cryptology, 3(2):99--111, 1991.]]
[9]
IBM India~Research Lab. E-coupons. http://www.research.ibm.com/irl/projects/ecoupons/.]]
[10]
M. Jakobsson, P. D. MacKenzie, and J. P. Stern. Secure and lightweight advertising on the web. In 9th World Wide Web Conference (WWW9), 1999.]]
[11]
Joint Industry Coupon Committee. Coupons: a complete guide. Grocery Manufacturers of America, 1998.]]
[12]
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, 1996.]]
[13]
M. Naor and B. Pinkas. Secure and efficient metering. In K. Nyberg, editor, Advances in Cryptology -- Eurocrypt '98, volume 1403 of Lecture Notes in Computer Science, pages 576--590, Espoo, Finland, 1998. Springer-Verlag, Berlin.]]
[14]
New York Times (C. Greenman). The trouble with rebates, September 16, 1999.]]
[15]
New York Times (M. Slatalla). Turning coupon users from clippers into clickers, April 1, 1999.]]
[16]
New York Times (B. Tedeschi). Is coupon clicking the next advertising trend?, May 12, 1998.]]

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '02: Proceedings of the 11th international conference on World Wide Web
May 2002
754 pages
ISBN:1581134495
DOI:10.1145/511446
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 May 2002

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. accountability
  2. e-commerce
  3. e-coupons
  4. security

Qualifiers

  • Article

Conference

WWW02
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 31 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)A Novel Sharing M-Coupons with Lightweight Computations via Cloud ComputingWeb, Artificial Intelligence and Network Applications10.1007/978-3-030-15035-8_43(459-470)Online publication date: 15-Mar-2019
  • (2015)Security Analysis of Two Chaotic Maps-Based Authentication SchemeApplied Mechanics and Materials10.4028/www.scientific.net/AMM.740.885740(885-888)Online publication date: Mar-2015
  • (2014)A Secure and Efficient Authentication Scheme for E-coupon SystemsWireless Personal Communications: An International Journal10.1007/s11277-014-1680-877:4(2981-2996)Online publication date: 1-Aug-2014
  • (2010)Non-repudiation in order, delivery and payment process for a sustainable online business2010 International Symposium on Information Technology10.1109/ITSIM.2010.5561515(1099-1103)Online publication date: Jun-2010
  • (2004)On designing a flexible e-payment system with fraud detection capabilityProceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004.10.1109/ICECT.2004.1319739(236-243)Online publication date: 2004

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media