JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 56-61.doi: 10.6040/j.issn.1671-9352.2.2014.345

Previous Articles     Next Articles

An offline sharable mCoupons scheme based on NFC

YUAN Bian-qing, LIU Ji-qiang   

  1. School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China
  • Received:2014-06-24 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: With the popularity of mobile devices, issuing mobile coupons (mCoupons) has increasingly become important for the merchants to promote their business. Based on the idea of word of mouth marketing between acquaintances, an offline sharable mCoupons scheme was proposed firstly. Near field communication (NFC) technology and identity-based public key system were used to store and deliver mCoupons securely. By introduction of identity-based proxy authorization mechanism, a shared chain which can encourage mobile users to share their mCoupons offline was created and transferred securely. Analysis shows that the scheme satisfies many security properties such as correctness, unforgeability, verifiability and so on, which protects interests of the consumers and the merchants.

Key words: near field communication, proxy signature, identity based, mCoupon

CLC Number: 

  • TP309
[1] DICKINGER A, KLEIJNEN M. Coupons going wireless: determinants of consumer intentions to redeem mobile coupons[J]. Journal of Interactive Marketing, 2008, 22(3):23-39.
[2] COSKUN V, OZDENIZCI B, OK K. A survey on near field communication (NFC) technology[J]. Wireless Personal Communications, 2013, 71(3): 2259-2294.
[3] DOMINIKUS S, AIGNER M. mCoupons: an application for near field communication (NFC)[C]//Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops(AINAW '07). Washington: IEEE Computer Society, 2007:421-428.
[4] AIGNER M, DOMINIKUS S, FELDHOFER M. A system of secure virtual coupons using NFC technology[C]//Proceedings of 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops.Washington: IEEE Computer Society, 2007: 362-366.
[5] HSIANG H C, KUO H C, SHIH W K. A secure mCoupon scheme using near field communication[J]. International Journal of Innovative Computing, Information and Control, 2009, 5(11): 3901-3909.
[6] PARK S W, LEE I Y. Efficient mCoupon authentication scheme for smart poster environments based on low-cost NFC[J]. International Journal of Security and Its Applications, 2013, 7(5): 131-138.
[7] ALSHEHRI A, BRIFFA J A, SCHNEIDER S, et al. Formal security analysis of NFC M-coupon protocols using Casper/FDR[C]//Proceedings of the 5th International Workshop on Near Field Communication. Washington: IEEE Computer Society, 2013: 1-6.
[8] SHOJIMA T, IKKAI Y, KOMODA N. A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system[C]//Proceedings of 2004 IEEE International Conference on Systems, Man and Cybernetics. Washington: IEEE Computer Society, 2004: 1086-1091.
[9] SHOJIMA T, IKKAI Y, KOMODA N, et al. An incentive attached peer to peer electronic coupon system[J]. Studies in Informatics and Control, 2004, 13(4): 233-242.
[10] CHANG Chin-chen, WU Chia-chi, LIN Luon-chang. A secure e-coupon system for mobile users[J]. International Journal of Computer Science and Network Security, 2006, 6(1): 273-279.
[11] HSUEH Sue-Chen, CHEN Junming. Sharing secure m-coupons for peer-generated targeting via eWOM communications[J]. Electronic Commerce Research and Applications, 2010, 9(4): 283-293.
[12] HESS F. Efficient identity based signature schemes based on pairings[M]//Selected Areas in Cryptography. Berlin-Heidelberg: Springer, 2003: 310-324.
[1] XIE Shu-cui, SHAO Ai-xia, ZHANG Jian-zhong. A quantum multi-proxy blind signature scheme based on cluster state [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 105-110.
[2] WU Lei 1, KONG Fanyu 2. An efficient IDbased proxy ring signature scheme [J]. J4, 2009, 44(1): 40-43 .
[3] LIU Xiao-dong,JIANG Ya-li,LI Da-xing . Two biometric identities based signature schemes [J]. J4, 2007, 42(12): 24-28 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!