EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions

被引:2
作者
Liu, Rui [1 ]
Song, Jun [2 ]
Huang, Zhiming [1 ]
Pan, Jianping [1 ]
机构
[1] Univ Victoria, Dept Comp Sci, Victoria, BC, Canada
[2] China Univ Geosci, Sch Comp Sci, Wuhan, Hubei, Peoples R China
关键词
QR code; e-coupon; e-commerce; commitment algorithms; visual cryptography; AUTHENTICATION SCHEME;
D O I
10.3233/JCS-191416
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, with the rapid development and popularization of e-commerce, the applications of e-coupons have become a market trend. As a typical bar code technique, QR codes can be well adopted in e-coupon-based payment services. However, there are many security threats to QR codes, including the QR code tempering, forgery, privacy information leakage and so on. To address these security problems for real situations, in this paper, we introduce a novel fragment coding-based approach for QR codes using the idea of visual cryptography. Then, we propose a QR code scheme with high security by combining the fragment coding with the commitment technique. Finally, an enhanced QR code-based secure e-coupon transaction framework is presented, which has a triple-verification feature and supports both online and offline scenarios. The following properties are provided: high information confidentiality, difficult to tamper with and forge, and the ability to resist against collusion attacks. Furthermore, the performance evaluation of computing and communication overhead is given to show the efficiency of the proposed framework.
引用
收藏
页码:577 / 605
页数:29
相关论文
共 45 条
[1]  
Black J, 2002, LECT NOTES COMPUT SC, V2442, P320
[2]  
Brickell E., 2004, P 11 ACM C COMP COMM, P132
[3]   A Survey of Geographical Routing in Wireless Ad-Hoc Networks [J].
Cadger, Fraser ;
Curran, Kevin ;
Santos, Jose ;
Moffett, Sandra .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2013, 15 (02) :621-653
[4]   Secure Electronic Coupons [J].
Chang, Chin-Chen ;
Lin, Iuon-Chang ;
Chi, Yi-Lun .
2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, :104-109
[5]   A Secure and Efficient Authentication Scheme for E-coupon Systems [J].
Chang, Ching-Chun ;
Sun, Chin-Yu .
WIRELESS PERSONAL COMMUNICATIONS, 2014, 77 (04) :2981-2996
[6]  
Chen L., 2009, CRYPTOLOGY EPRINT AR
[7]   Threshold Anonymous Announcement in VANETs [J].
Chen, Liqun ;
Ng, Siaw-Lynn ;
Wang, Guilin .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) :605-615
[8]   Improved Visual Secret Sharing Scheme for QR Code Applications [J].
Cheng, Yuqiao ;
Fu, Zhengxin ;
Yu, Bin .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (09) :2393-2403
[9]   Analysis of SHA-512/224 and SHA-512/256 [J].
Dobraunig, Christoph ;
Eichlseder, Maria ;
Mendel, Florian .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :612-630
[10]   Branching Heuristics in Differential Collision Search with Applications to SHA-512 [J].
Eichlseder, Maria ;
Mendel, Florian ;
Schlaeffer, Martin .
FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 :473-488