Skip to main content

Loyalty Program Scheme for Anonymous Payment Systems

  • Conference paper
  • First Online:
Electronic Commerce and Web Technologies (EC-Web 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1875))

Included in the following conference series:

Abstract

Loyalty program is a marketing effort by the merchant to keep customers loyal to their stores. It tries to keep track of the purchasing-behavior of a customer by recording customer’s purchase information, including his credit card number, as a key identifier to the customer. While it may benefit the customer, the drawback is that the privacy of the customer is intruded. If the customer is using an anonymous payment system such as electronic cash / digital coins, his privacy is protected, but he will not get any benefit from the loyalty program which tries to record his payment information. This paper suggests several solutions to solve merchant’s need to gather statistical data from customer’s purchasing behavior versus customer’s need for privacy. Among the solutions, we present the idea of blindly signed pseudo digital certificates, which satisfies our requirement for a loyalty program scheme with an anonymous payment system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Jo Ann S. Barefoot. Privacy under scrutiny. In Banking Strategies, Nov/Dec 1999.

    Google Scholar 

  2. Ruth N. Bolton, P. K. Kannan and Matthew D. Bramlett. Implications of loyalty program membership and service experiences for customer retention and value. In Journal of Academy of Marketing Science. Greenvale, Winter 2000.

    Google Scholar 

  3. Stefan Brands. An efficient off-line electronic cash system based on the representation problem. Report CS-R9323, Centrum voor Wiskunde en Informatica, March 1993.

    Google Scholar 

  4. David Chaum, Amos Fiat and Moni Naor. Untraceable electronic cash. In Advances in Cryptology — proceedings of CRYPTO 88, Lecture Notes in Computer Science 403, Springer-Verlag, 1990.

    Chapter  Google Scholar 

  5. David Chaum. Blind signatures for untraceable payments. In Advances in Cryptology — proceedings of CRYPTO 82, Plenum Press, New York, 1983.

    Google Scholar 

  6. David Chaum. Achieving Electronic Privacy. In Scientific American, August 1992.

    Google Scholar 

  7. David Chaum and Torben Pryds Pedersen. Wallet databases with observers. In Advances in Cryptology — CRYPTO 92. Lecture Notes in Computer Science 740, Springer-Verlag, 1993.

    Google Scholar 

  8. Jan L. Camenish, Jean-Marc Piveteau and Markus A. Stadler. An Efficient Electronic Payment System Protecting Privacy. In Proceedings of ESORICS’ 94. Lecture Notes inComputer Science 875, Springer-Verlag, 1995.

    Google Scholar 

  9. Tony Eng and Tatsuaki Okamoto. Single term divisible electronic coins. In Advances in Cryptology — EUROCRYPT 94. Lecture Notes in Computer Science 960, Springer-Verlag, 1995.

    Google Scholar 

  10. Niels Ferguson. Single term off-line coins. In Advances in Cryptology — EUROCRYPT 93, Lecture Notes in Computer Science 765, Springer-Verlag, 1994.

    Google Scholar 

  11. Niels Ferguson. Extensions of single term coins. In Advances in Cryptology — CRYPTO 93, Lecture Notes in Computer Science 773, Springer-Verlag, 1994.

    Chapter  Google Scholar 

  12. GVU WWW Surveying Team, Georgia Institute of Technology, GVU’s 8 th WWW User Survey. Available at http://www.gvu.gatech.edu/user_surveys/, 1997.

  13. Elaine K. Harris. Customer Service: A Practical Approach, Prentice Hall, Upper Saddle River, 1996.

    Google Scholar 

  14. Denison Hatch. Privacy: how much data do direct marketers really need?. In Rob Kling (ed)., Computerization and Controversy: Value Conflicts and Social Choices, 2nd edition. Academic Press, San Diego, 1996.

    Google Scholar 

  15. A.S. Hornby and A.P. Cowie (editor), Oxford Advanced Learner’s Dictionary of Current English, Oxford University Press, Oxford, 1992

    Google Scholar 

  16. Stephen H. Low, Nicholas F. Maxemchuk and Sanjoy Paul. Anonymous Credit Cards. In Proceedings of the 2 nd ACM Conference on Computer and Communication Security. 1994.

    Google Scholar 

  17. Anna Lysyanskaya and Zulfikar Ramzan. Group blind digital signatures: A scalable solution to electronic cash. In Financial Cryptography, 2nd International Conference, FC 98, Lecture Notes in Computer Science 1465, Springer, 1998.

    Google Scholar 

  18. Gerrard Macintosh and Lawrence S. Lockshin. Retail relationship and store loyalty: A multi-level perspective. In International Journal of Research in Marketing, vol. 14, 1997.

    Google Scholar 

  19. Alfred_J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997.

    MATH  Google Scholar 

  20. Netscape Communications Security, Cookies and Privacy FAQ, available at http://www.cookiecentral.com/n_cookie_faq.htm, 1997

  21. Tatsuaki Okamoto. An efficient divisible electronic cash scheme. In Advances in Cryptology — CRYPTO 95. Lecture Notes in Computer Science 963, Springer-Verlag, 1995.

    Chapter  Google Scholar 

  22. Tatsuaki Okamoto and Kazuo Ohta. Universal electronic cash. In Advances in Cryptology — CRYPTO 91. Lecture Notes in Computer Science 576, Springer-Verlag, 1992.

    Google Scholar 

  23. S. Pearson. How to achieve return on investment from customer loyalty — part 1. In Journal of Targeting, Measurement and Analysis for Marketing, vol. 3 no. 1, 1994.

    Google Scholar 

  24. Cristian Radu, René Govaerts and Joss Vandewalle. Efficient electronic cash with restricted privacy. In Financial Cryptography, 1 st International Conference, FC 97, Lecture Notes in Computer Science 1318, Springer, 1997.

    Google Scholar 

  25. Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edition, John Wiley & Sons. Inc., New York, 1996.

    MATH  Google Scholar 

  26. Byron Sharp and Anne Sharp. Loyalty programs and their impact on repeat-purchase loyalty patterns. In International Journal of Research in Marketing, vol. 14, 1997.

    Google Scholar 

  27. Yiannis S. Tsiounis. Efficient electronic cash: new notions and techniques. Ph.D. thesis. Department of Computer Science, Northeastern University, 1997.

    Google Scholar 

  28. David Whaler, The Unofficial Cookie FAQ, available at http//www.cookiecentral.com/faq/, 1999.

    Google Scholar 

  29. Yacov Yacobi. Efficient electronic money. In Advances in Cryptology — ASIACRYPT 94. Lecture Notes in Computer Science 917, Springer-Verlag, 1995.

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wibowo, A.M., Lam, K.Y., Tan, G.S.H. (2000). Loyalty Program Scheme for Anonymous Payment Systems. In: Bauknecht, K., Madria, S.K., Pernul, G. (eds) Electronic Commerce and Web Technologies. EC-Web 2000. Lecture Notes in Computer Science, vol 1875. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44463-7_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-44463-7_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67981-3

  • Online ISBN: 978-3-540-44463-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics