A Secure E-coupon System for Mobile Users

Summary Since nowadays mobile phone messages are flourishing, the application of electronic coupon (e-coupon) will become a trend for mobile users. E-coupon for mobile commerce can provide mobility for users and distribution flexibility for issuers. However, most of the existed e-coupon schemes usually apply public-key cryptosystem to achieve the security, which will not be implemented in mobile devices due to the complex computations. In this paper, we propose a novel mobile e-coupon system that just applies some simple cryptographic techniques, such as one-way hash function and message authentication code. In our system, the issuer can control the number of issued e-coupons and prevent them from double-redeeming. The merchant can verify the validity of the e-coupon and the customers can securely transfer the e-coupon to others. The customer does not need to perform any exponential computation in redeeming and transferring the coupons.

[1]  Taiki Shojima,et al.  A method for mediator identification using queued history of encrypted user information in an incentive attached peer to peer electronic coupon system , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[2]  Ko Fujimura,et al.  Distributed digital-ticket management for rights trading system , 1999, EC '99.

[3]  Adi Shamir,et al.  PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.

[4]  Yi-Shiung Yeh,et al.  Date attachable electronic cash , 2000, Comput. Commun..

[5]  Rakesh Mohan,et al.  Sales Promotions on the Internet , 1998, USENIX Workshop on Electronic Commerce.

[6]  Feng Bao A scheme of digital ticket for personal trusted device , 2004, 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754).

[7]  Chin-Chen Chang,et al.  Schemes for Digital Gift Certificates with Low Computation Complexity , 2005, Informatica.

[8]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[9]  Li Xiao,et al.  Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks , 2003, IEEE Trans. Parallel Distributed Syst..

[10]  Jun Sekine,et al.  Digital-Ticket-Controlled Digital Ticket Circulation , 1999, USENIX Security Symposium.

[11]  Chin-Chen Chang,et al.  Time-bounded based password authentication scheme , 2005, 2005 International Conference on Cyberworlds (CW'05).

[12]  Ronald L. Rivest,et al.  The MD5 Message-Digest Algorithm , 1992, RFC.

[13]  Ko Fujimura,et al.  General-purpose Digital Ticket Framework , 1998, USENIX Workshop on Electronic Commerce.

[14]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[15]  Ralph Howard,et al.  Data encryption standard , 1987 .