A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search

Jinghua Jiang, Xiaolin Gui, Yifeng Zheng, Xuejun Zhang, Xingliang Yuan, Cong Wang

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

A framework of secure delivery service of targeted coupons with encrypted search is proposed to solve privacy issues of users and vendors in delivery service of mobile targeted coupons. The proposed framework adopts a newly developed cryptographic primitive, called multi-key searchable encryption, which ensures that a user only needs to submit a single encrypted request to the coupon site so as to conduct secure and effective search over encrypted coupons from different vendors. Meanwhile, the framework ensures that eligible users can obtain targeted coupons without leaking their behavioral data while non-eligible users learn nothing beyond their non-eligibility status by combining locality-sensitive hashing with password authenticated key exchange. Theoretical analysis proves the security of the proposed framework. Extensive experiments show that when a mobile user obtains coupons from 10 different vendors, the computation cost of the proposed framework is 57.8 ms, bandwidth cost 2.9 KiB, and energy cost 8.7 J. The proposed framework provides a well-balanced tradeoff between security and efficiency, and has certain theoretical and practical significance for the design of secure and practical targeted delivery systems.

Original languageEnglish
Pages (from-to)13-19
Number of pages7
JournalHsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University
Volume51
Issue number2
DOIs
Publication statusPublished - 10 Feb 2017

Keywords

  • Behavioral data
  • Coupon delivery
  • Encrypted search
  • Privacy security
  • Targeted delivery

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'A Framework of Secure Delivery Service for Targeted Coupons with Encrypted Search'. Together they form a unique fingerprint.

Cite this