Information Systems Frontiers

, Volume 7, Issue 4–5, pp 359–370 | Cite as

Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System



Loyalty systems provide an interesting possibility for vendors in customer relationship management. This holds for both real world and online vendors. Many vendors apply loyalty systems to collect customer-specific data that may be exploited for many reasons, e.g., price discrimination and direct marketing. As a consequence, beside some potential benefits of a loyalty system, customers may also fear an invasion of privacy, and thus often refuse to participate in such programs. Thus, a vendor may have problems to turn privacy sensitive people into loyal customers using a typical loyalty system. In this paper, we present two variants of a privacy-friendly loyalty system to be used by online vendors for issuing loyalty points. The systems prevent vendors from exploiting data for the creation of customer profiles by providing unconditional unlinkability of loyalty points with regard to purchases. We propose a simple token-based approach and a counter-based approach which is much more efficient while preserving the privacy and security properties. Furthermore, the counter-based loyalty system prevents pooling of loyalty points which were issued to distinct customers.

customer retention e-commerce loyalty systems privacy 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Bolton R, Kannan P, Bramlett M. Implications of loyalty programs and service experiences for customer retention and value. Journal of the Academy of Marketing Science, 2000;28(1).Google Scholar
  2. Camenisch J, Piveteau J-M, Stadler M. An efficient fair payment system. In: 1st ACM Conference on Computer and Communications Security (CCS'96). ACM Press, 1996.Google Scholar
  3. Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981;24(2).Google Scholar
  4. Chaum D. Blind signatures for untraceable payments. In: Advances in Cryptology—CRYPTO '82, Proceedings. Plenum Press, 1983.Google Scholar
  5. Chaum D. Privacy Protected Payments: Unconditional Payer and/or Payee Untraceability. In: Smart Card 2000, Proceedings. North Holland, 1989.Google Scholar
  6. Cigliano J. Georgiadis M, Pleasance D, Whalley S. The power of loyalty—creating winning loyalty programs. McKinsey On Retail, McKinsey White Papers, 2000.Google Scholar
  7. Dowling G, Uncles M. Do customer loyalty programs really work?. Sloan Management Review, 1997;38(4):71–82.Google Scholar
  8. Enzmann M, Eckert C. Pseudonymes Einkaufen physischer Güter. In: Sichere Geschäftsprozesse, Tagungsband zur Arbeitskonferenz Elektronische Geschäftsprozesse. IT Verlag für Informationstechnik 2002.Google Scholar
  9. Enzmann M, Fischlin M, Schneider M. A privacy-friendly loyalty system based on discrete logarithms over elliptic curves. In: Financial Cryptography 2004, Pre-Proceedings, (Final Proceedings to be published in LNCS series, Springer Verlag), 2004.Google Scholar
  10. Enzmann M, Kunz T, Schneider M. A new infrastructure for user tracking prevention and privacy protection in internet shopping. In: Infrastructure Security Conference (InfraSec'02). Springer Verlag, 2002a.Google Scholar
  11. Enzmann M, Kunz T, Schneider M. Privacy protection through unlinkability of customer activities in business processes using mobile agents. In: 3rd International Conference on Electronic Commerce and Web Technologies (EC-Web 2002). Springer Verlag, 2002b.Google Scholar
  12. Feinberg F, Krishna A, Zhang Z. Do we care what others get? A behaviorist approach to targeted promotions. Journal of Marketing Research, 2002;39(3).Google Scholar
  13. Hoffman D, Novak T, Peralta M. Building Consumer Trust Online. Communications of the ACM, 1999;42(4).Google Scholar
  14. Kobsa A. Tailoring privacy to users's needs. In: User Modeling 2001 (UM 2001), 8th International Conference, Proceedings. Springer Verlag, 2001.Google Scholar
  15. Macintosh G, Lockshin L. Retail relationships and store loyalty: A multi-level perspective. International Journal of Research in Marketing, 1997;14(5).Google Scholar
  16. Maher D. A Platform for Privately Defined Currencies, Loyalty Credits, and Play Money. In: Financial Cryptography, Second International Conference (FC'98), Proceedings. Springer Verlag, 1998.Google Scholar
  17. Maurer U. Fast generation of prime numbers and secure public-key cryptographic parameters. Journal of Cryptology, 1995;8(3).Google Scholar
  18. Moores T, Dhillon G. Do privacy seals in e-commerce really work?. Communications of the ACM, 2003;46(12).Google Scholar
  19. O'Connor G, O'Keefe R. The internet as a new marketplace: Implications for Consumer Behaviour and Marketing Management. In M. Shaw, R. Blanning, T. Strader, and A. Whinston (eds.), Handbook on Electronic Commerce. Springer Verlag, 2000.Google Scholar
  20. Odlyzko A. Privacy, Economics, and price discrimination on the internet. In: 5th International Conference on Electronic Commerce (ICEC 2003). ACM Press, 2003.Google Scholar
  21. Reed M, Syverson P, Goldschlag D. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications—Special Issue on Copyright and Privacy Protection, 1998;16(4).Google Scholar
  22. Rivest RL, Shamir A., Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 1978;21(2).Google Scholar
  23. Rust R, Kannan P. E-service: A new paradigm for business in the electronic environment. Communications of the ACM, 2003; 46(6).Google Scholar
  24. Shaffer G, Zhang Z. Competitivec coupon marketing. Marketing Science, 1995;14(4).Google Scholar
  25. Sharp B, Sharp A. Loyalty programs and their impact on repeat-purchase loyalty patterns. International Journal of Research in Marketing, 1997;14(5).Google Scholar
  26. Wibowo A, Lam K, Tan G. Loyalty program scheme for anonymous payment systems. In: Electronic Commerce and Web Technologies. Springer Verlag, 2000.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  1. 1.Fraunhofer Gesellschaft (FhG)Institute for Secure Telecooperation (SIT)DarmstadtGermany

Personalised recommendations