A Novel Sharing M-Coupons with Lightweight Computations via Cloud Computing

  • Iuon-Chang LinEmail author
  • Hsiao-Chi Chiang
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 927)


Coupons are useful and widely used in the market place to attract new customers and keep loyal customers. As more and more wireless devices are connected to the Internet, many have computed that mobile commerce will blossom soon, just like e-commerce booming in recent years. In this paper, we proposed a secure sharing m-coupon scheme that a user can use the mobile device to share the sharable m-coupons to his/her friend through the cloud. In the proposed scheme, a customer does not need to download the m-coupon from cloud. If customer wants to redeem the m-coupon, he just needs to send a redemption request message to the cloud, and the cloud will help the customer to transfer the m-coupon to the retiler. So that the customers do not worry about problem of storing and losing, it is convenient for customers. Our implementation incorporates only lightweight computations, message authentication code, and simple hash chains for security.


  1. 1.
    Scharl, A., Dickinger, A., Murphy, J.: Diffusion and success factors of mobile marketing. Electron. Commer. Res. Appl. 4(2), 159–173 (2005)CrossRefGoogle Scholar
  2. 2.
    Neil, D.S.: Coupons: Identifying New Opportunities Beyond Early Trials. Jupiter Research Report (2008)Google Scholar
  3. 3.
    Juniper Research: Mobile Coupons (2008).
  4. 4.
    Raskino, M.: Mobile coupons will reach right into your pocket. GartnerGroup Research Note (2001).
  5. 5.
    Kumar, M., Rangachari, A., Jhingran, A., Mohan, R.: Sales promotions on the internet. In: Proceedings of the 3rd USENIX Workshop on Electronic Commerce, pp. 167–176 (1998)Google Scholar
  6. 6.
    Blundo, C., Cimato, S., De Bonis, A.: A lightweight protocol for the generation and distribution of secure e-coupons. In: Proceedings of the 11th International Conference on World Wide Web, Honolulu, Hawaii, USA, pp. 542–552 (2002)Google Scholar
  7. 7.
    Blundo, C., Cimato, S., De Bonis, A.: Secure E-coupons. E-Commer. Res. 5(1), 117–139 (2005)CrossRefGoogle Scholar
  8. 8.
    Chang, C.C., Wu, C.C., Lin, I.C.: A secure E-coupon system for mobile users. Int. J. Comput. Sci. Netw. Secur. 6(1), 273–279 (2006)Google Scholar
  9. 9.
    Wray, J., Plante, D.: Mobile advertising engine for centralized mobile coupon delivery. Int. J. Manag. Mark. Res. 4(1), 75–85 (2011)Google Scholar
  10. 10.
    Hsueh, S.C., Chen, J.M.: Sharing secure m-coupons for peer-generated targeting via eWOM communications. Electron. Commer. Res. Appl. 9(4), 283–293 (2010)CrossRefGoogle Scholar
  11. 11.
    Ricest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Proceedings of 1996 International Workshop on Security Protocols, pp. 69–87 (1996)Google Scholar
  12. 12.
    Damgard, I.B.: A design principle for hash functions. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 416–427 (1990)Google Scholar
  13. 13.
    Merkle, R.C.: One way hash function and DES. In: Advances in Cryptology-CRYPTO 1989. LNCS, vol. 435, pp. 428–446 (1989)Google Scholar
  14. 14.
    Merkle, R.C.: A fast software one-way hash function. J. Cryptol. 3(1), 43–58 (1990)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Davies, D.W.: A message authentication algorithm suitable for a main-frame computer. In: Advance in Cryptology-CRYPTO 1984. LNCS, vol. 196, pp. 393–400 (1984)Google Scholar
  16. 16.
    ISO/IEC 9797: Data cryptographic techniques-data integrity mechanism using a cryptographic check function employing a block cipher algorithm. Internal Organization for StandardizationGoogle Scholar
  17. 17.
    Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press Inc., Boca Raton (1996)CrossRefGoogle Scholar
  18. 18.
    Hendry, M.: Smart Card Security and Applications. Artech House, Norwood (1997)zbMATHGoogle Scholar
  19. 19.
    Jones, H.W.E., Watson, A.C., O’Neill, T.J.: Vehicle security using smartcards. Secur. J. 13(2), 79–87 (1998)CrossRefGoogle Scholar
  20. 20.
    Schneier, B.: Applied Cryptography, 2nd edn. Wiley, Hoboken (1996)zbMATHGoogle Scholar
  21. 21.
    Baldonado, M., Chang, C.-C.K., Gravano, L., Paepcke, A.: The stanford digital library metadata architecture. Int. J. Digit. Libr. 1, 108–121 (1997)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Management Information SystemsNational Chung Hsing UniversityTaichungTaiwan, Republic of China

Personalised recommendations