Skip to main content
Top
Published in: Wireless Personal Communications 4/2014

01-08-2014

A Secure and Efficient Authentication Scheme for E-coupon Systems

Authors: Ching-Chun Chang, Chin-Yu Sun

Published in: Wireless Personal Communications | Issue 4/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Through the explosive growth of network technologies, electronic commercial businesses have made our lives easier and more convenient. The application of e-coupons is quite a novel issue but is becoming increasingly popular among electronic commercial businesses because the extensive use of e-coupons can help consumers to save money; however, the e-coupon has also brought security issues as attackers can obtain illegitimate benefits from imperfections of the design. Hence, the security of the e-coupon system has become important as well. In this paper, we propose a novel and complete chaotic maps-based authentication scheme for e-coupon systems. Security analysis shows that our scheme satisfies essential security and functionality requirements. Furthermore, performance analysis shows that the execution time of our scheme is efficient and suitable for practical implementation in real life. In other words, users such as shops and customers can use our e-coupon system conveniently and securely.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11–16), 1101–1109. Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11–16), 1101–1109.
2.
go back to reference Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A. Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A.
3.
go back to reference Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51–63). California, U.S.A. Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51–63). California, U.S.A.
4.
go back to reference Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370–383). Torino, Italy. Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370–383). Torino, Italy.
5.
go back to reference Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542–552). New York, U.S.A. Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542–552). New York, U.S.A.
6.
go back to reference Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086–1091. Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086–1091.
8.
go back to reference Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283–293.CrossRef Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283–293.CrossRef
9.
go back to reference Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38–52.CrossRef Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38–52.CrossRef
10.
go back to reference Xiao, D., Liaoa, X., & Wong, K. W. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327–1331.CrossRefMATH Xiao, D., Liaoa, X., & Wong, K. W. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327–1331.CrossRefMATH
11.
go back to reference Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRefMATHMathSciNet Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRefMATHMathSciNet
13.
go back to reference Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi:10.1002/dac.2448. Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi:10.​1002/​dac.​2448.
14.
go back to reference Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smartcards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smartcards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet
15.
go back to reference He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
16.
17.
go back to reference Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177–186.CrossRef Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177–186.CrossRef
18.
go back to reference Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley.MATH Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley.MATH
19.
go back to reference Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362–366). New York, U.S.A. Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362–366). New York, U.S.A.
20.
go back to reference Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421–428), Ontario, Canada. Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421–428), Ontario, Canada.
21.
go back to reference Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information. Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information.
22.
go back to reference Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131–138.CrossRef Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131–138.CrossRef
Metadata
Title
A Secure and Efficient Authentication Scheme for E-coupon Systems
Authors
Ching-Chun Chang
Chin-Yu Sun
Publication date
01-08-2014
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 4/2014
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1680-8

Other articles of this Issue 4/2014

Wireless Personal Communications 4/2014 Go to the issue