Advertisement

Loyalty Program Scheme for Anonymous Payment Systems

  • Arrianto Mukti Wibowo
  • Kwok Yan Lam
  • Gary S. H. Tan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1875)

Abstract

Loyalty program is a marketing effort by the merchant to keep customers loyal to their stores. It tries to keep track of the purchasing-behavior of a customer by recording customer’s purchase information, including his credit card number, as a key identifier to the customer. While it may benefit the customer, the drawback is that the privacy of the customer is intruded. If the customer is using an anonymous payment system such as electronic cash / digital coins, his privacy is protected, but he will not get any benefit from the loyalty program which tries to record his payment information. This paper suggests several solutions to solve merchant’s need to gather statistical data from customer’s purchasing behavior versus customer’s need for privacy. Among the solutions, we present the idea of blindly signed pseudo digital certificates, which satisfies our requirement for a loyalty program scheme with an anonymous payment system.

Keywords

Credit Card Customer Loyalty Certificate Authority Loyalty Program True Identity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Jo Ann S. Barefoot. Privacy under scrutiny. In Banking Strategies, Nov/Dec 1999.Google Scholar
  2. 2.
    Ruth N. Bolton, P. K. Kannan and Matthew D. Bramlett. Implications of loyalty program membership and service experiences for customer retention and value. In Journal of Academy of Marketing Science. Greenvale, Winter 2000.Google Scholar
  3. 3.
    Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Report CS-R9323, Centrum voor Wiskunde en Informatica, March 1993.Google Scholar
  4. 4.
    David Chaum, Amos Fiat and Moni Naor. Untraceable electronic cash. In Advances in Cryptology — proceedings of CRYPTO 88, Lecture Notes in Computer Science 403, Springer-Verlag, 1990.CrossRefGoogle Scholar
  5. 5.
    David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology — proceedings of CRYPTO 82, Plenum Press, New York, 1983.Google Scholar
  6. 6.
    David Chaum. Achieving Electronic Privacy. In Scientific American, August 1992.Google Scholar
  7. 7.
    David Chaum and Torben Pryds Pedersen. Wallet databases with observers. In Advances in Cryptology — CRYPTO 92. Lecture Notes in Computer Science 740, Springer-Verlag, 1993.Google Scholar
  8. 8.
    Jan L. Camenish, Jean-Marc Piveteau and Markus A. Stadler. An Efficient Electronic Payment System Protecting Privacy. In Proceedings of ESORICS’ 94. Lecture Notes inComputer Science 875, Springer-Verlag, 1995.Google Scholar
  9. 9.
    Tony Eng and Tatsuaki Okamoto. Single term divisible electronic coins. In Advances in Cryptology — EUROCRYPT 94. Lecture Notes in Computer Science 960, Springer-Verlag, 1995.Google Scholar
  10. 10.
    Niels Ferguson. Single term off-line coins. In Advances in Cryptology — EUROCRYPT 93, Lecture Notes in Computer Science 765, Springer-Verlag, 1994.Google Scholar
  11. 11.
    Niels Ferguson. Extensions of single term coins. In Advances in Cryptology — CRYPTO 93, Lecture Notes in Computer Science 773, Springer-Verlag, 1994.CrossRefGoogle Scholar
  12. 12.
    GVU WWW Surveying Team, Georgia Institute of Technology, GVU’s 8 th WWW User Survey. Available at http://www.gvu.gatech.edu/user_surveys/, 1997.
  13. 13.
    Elaine K. Harris. Customer Service: A Practical Approach, Prentice Hall, Upper Saddle River, 1996.Google Scholar
  14. 14.
    Denison Hatch. Privacy: how much data do direct marketers really need?. In Rob Kling (ed)., Computerization and Controversy: Value Conflicts and Social Choices, 2nd edition. Academic Press, San Diego, 1996.Google Scholar
  15. 15.
    A.S. Hornby and A.P. Cowie (editor), Oxford Advanced Learner’s Dictionary of Current English, Oxford University Press, Oxford, 1992Google Scholar
  16. 16.
    Stephen H. Low, Nicholas F. Maxemchuk and Sanjoy Paul. Anonymous Credit Cards. In Proceedings of the 2 nd ACM Conference on Computer and Communication Security. 1994.Google Scholar
  17. 17.
    Anna Lysyanskaya and Zulfikar Ramzan. Group blind digital signatures: A scalable solution to electronic cash. In Financial Cryptography, 2nd International Conference, FC 98, Lecture Notes in Computer Science 1465, Springer, 1998.Google Scholar
  18. 18.
    Gerrard Macintosh and Lawrence S. Lockshin. Retail relationship and store loyalty: A multi-level perspective. In International Journal of Research in Marketing, vol. 14, 1997.Google Scholar
  19. 19.
    Alfred_J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997.zbMATHGoogle Scholar
  20. 20.
    Netscape Communications Security, Cookies and Privacy FAQ, available at http://www.cookiecentral.com/n_cookie_faq.htm, 1997
  21. 21.
    Tatsuaki Okamoto. An efficient divisible electronic cash scheme. In Advances in Cryptology — CRYPTO 95. Lecture Notes in Computer Science 963, Springer-Verlag, 1995.CrossRefGoogle Scholar
  22. 22.
    Tatsuaki Okamoto and Kazuo Ohta. Universal electronic cash. In Advances in Cryptology — CRYPTO 91. Lecture Notes in Computer Science 576, Springer-Verlag, 1992.Google Scholar
  23. 23.
    S. Pearson. How to achieve return on investment from customer loyalty — part 1. In Journal of Targeting, Measurement and Analysis for Marketing, vol. 3 no. 1, 1994.Google Scholar
  24. 24.
    Cristian Radu, René Govaerts and Joss Vandewalle. Efficient electronic cash with restricted privacy. In Financial Cryptography, 1 st International Conference, FC 97, Lecture Notes in Computer Science 1318, Springer, 1997.Google Scholar
  25. 25.
    Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons. Inc., New York, 1996.zbMATHGoogle Scholar
  26. 26.
    Byron Sharp and Anne Sharp. Loyalty programs and their impact on repeat-purchase loyalty patterns. In International Journal of Research in Marketing, vol. 14, 1997.Google Scholar
  27. 27.
    Yiannis S. Tsiounis. Efficient electronic cash: new notions and techniques. Ph.D. thesis. Department of Computer Science, Northeastern University, 1997.Google Scholar
  28. 28.
    David Whaler, The Unofficial Cookie FAQ, available at http//www.cookiecentral.com/faq/, 1999.Google Scholar
  29. 29.
    Yacov Yacobi. Efficient electronic money. In Advances in Cryptology — ASIACRYPT 94. Lecture Notes in Computer Science 917, Springer-Verlag, 1995.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Arrianto Mukti Wibowo
    • 1
  • Kwok Yan Lam
    • 1
  • Gary S. H. Tan
    • 1
  1. 1.Computer Science Department, School of ComputingNational University of SingaporeSingapore

Personalised recommendations