Skip to main content
Erschienen in: Wireless Personal Communications 4/2014

01.08.2014

A Secure and Efficient Authentication Scheme for E-coupon Systems

verfasst von: Ching-Chun Chang, Chin-Yu Sun

Erschienen in: Wireless Personal Communications | Ausgabe 4/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Through the explosive growth of network technologies, electronic commercial businesses have made our lives easier and more convenient. The application of e-coupons is quite a novel issue but is becoming increasingly popular among electronic commercial businesses because the extensive use of e-coupons can help consumers to save money; however, the e-coupon has also brought security issues as attackers can obtain illegitimate benefits from imperfections of the design. Hence, the security of the e-coupon system has become important as well. In this paper, we propose a novel and complete chaotic maps-based authentication scheme for e-coupon systems. Security analysis shows that our scheme satisfies essential security and functionality requirements. Furthermore, performance analysis shows that the execution time of our scheme is efficient and suitable for practical implementation in real life. In other words, users such as shops and customers can use our e-coupon system conveniently and securely.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11–16), 1101–1109. Jakobsson, M., Mackenzie, P. D., & Stern, J. P. (1999). Secure and lightweight advertising on the web. Journal of Computer and Telecommunications Networking, 31(11–16), 1101–1109.
2.
Zurück zum Zitat Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A. Anand, R., Kumar, M., & Jhingran, A. (1999). Distributing E-coupon on the Internet. In Proceedings of 9th Annual Conference of the Internet Society, California, U.S.A.
3.
Zurück zum Zitat Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51–63). California, U.S.A. Garg, R., Mittal, P., Agarwal, V., & Modani, N. (2001). An architecture for secure generation and verification of electronic coupons. In Proceedings of the General Track: 2002 USENIX Annual Technical Conference (pp. 51–63). California, U.S.A.
4.
Zurück zum Zitat Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370–383). Torino, Italy. Cimato, S., & Bonis, A. D. (2001). Online advertising: Secure E-coupons. In Proceedings of 7th Italian Conference on Theoretical Computer Science (pp. 370–383). Torino, Italy.
5.
Zurück zum Zitat Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542–552). New York, U.S.A. Blundo, C., Cimato, S., & Bonis, A. D. (2002). A lightweight protocol for the generation and distribution of secure e-coupons. In Proceedings of 11th international conference on World Wide Web (pp. 542–552). New York, U.S.A.
6.
Zurück zum Zitat Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086–1091. Shojima, T., Ikkai, Y., & Komoda, N. (2004). A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system. Proceedings of IEEE International Conference on Systems, Man and Cybernetics, 1, 1086–1091.
8.
Zurück zum Zitat Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283–293.CrossRef Hsueh, S. C., & Chen, J. M. (2010). Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electronic Commerce Research and Applications, 9(4), 283–293.CrossRef
9.
Zurück zum Zitat Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38–52.CrossRef Thorsten, H. T., Gwinner, K. P., Walsh, G., & Gremler, D. D. (2004). Electronic word-of-mouth via consumer-opinion platforms: What motivates consumers to articulate themselves on the Internet? Journal of Interactive Marketing, 18(1), 38–52.CrossRef
10.
Zurück zum Zitat Xiao, D., Liaoa, X., & Wong, K. W. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327–1331.CrossRefMATH Xiao, D., Liaoa, X., & Wong, K. W. (2005). An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, 23(4), 1327–1331.CrossRefMATH
11.
Zurück zum Zitat Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRefMATHMathSciNet Rivest, R., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRefMATHMathSciNet
13.
Zurück zum Zitat Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi:10.1002/dac.2448. Chang, C. C., Cheng, T. F., & Wu, H. L. (2012). An authentication and key agreement scheme for satellite communications. International Journal of Communication Systems, First published. doi:10.​1002/​dac.​2448.
14.
Zurück zum Zitat Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smartcards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet Li, C. T., & Lee, C. C. (2012). A novel user authentication and privacy preserving scheme with smartcards for wireless communications. Mathematical and Computer Modelling, 55(1–2), 35–44.CrossRefMATHMathSciNet
15.
Zurück zum Zitat He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
16.
17.
Zurück zum Zitat Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177–186.CrossRef Lee, C. C. (2013). A simple key agreement scheme based on chaotic maps for VSAT satellite communications. International Journal of Satellite Communications and Networking, 31(4), 177–186.CrossRef
18.
Zurück zum Zitat Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley.MATH Schneier, B. (1996). Applied cryptography, protocols, algorithms, and source code in C (2nd ed.). New York, USA: Wiley.MATH
19.
Zurück zum Zitat Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362–366). New York, U.S.A. Aigner, M., Dominikus, S., & Feldhofer, M. (2007). A system of secure virtial coupons using NFC technology. In Proceedings of IEEE International Conference on Pervasive Computing and Communication Workshops (pp. 362–366). New York, U.S.A.
20.
Zurück zum Zitat Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421–428), Ontario, Canada. Dominikus, S., & Aigner, M. (2007). mCoupons: An application for near field communication (NFC). In Proceedings of 21st International Conference on Advanced Information Networking and Applications Workshops (pp. 421–428), Ontario, Canada.
21.
Zurück zum Zitat Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information. Hsiang, H. C., & Shih, W. K. (2008). Secure mCoupons scheme using NFC. Seoul, Korea: Proceedings of the International Conference on Business and Information.
22.
Zurück zum Zitat Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131–138.CrossRef Park, S. W., & Lee, I. Y. (2013). Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC. International Journal of Security and its Applications, 7(5), 131–138.CrossRef
Metadaten
Titel
A Secure and Efficient Authentication Scheme for E-coupon Systems
verfasst von
Ching-Chun Chang
Chin-Yu Sun
Publikationsdatum
01.08.2014
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 4/2014
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-014-1680-8

Weitere Artikel der Ausgabe 4/2014

Wireless Personal Communications 4/2014 Zur Ausgabe

Neuer Inhalt