{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T11:01:59Z","timestamp":1777806119221,"version":"3.51.4"},"reference-count":47,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T00:00:00Z","timestamp":1595548800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Security"],"published-print":{"date-parts":[[2020,9,28]]},"abstract":"<jats:p>In recent years, with the rapid development and popularization of e-commerce, the applications of e-coupons have become a market trend. As a typical bar code technique, QR codes can be well adopted in e-coupon-based payment services. However, there are many security threats to QR codes, including the QR code tempering, forgery, privacy information leakage and so on. To address these security problems for real situations, in this paper, we introduce a novel fragment coding-based approach for QR codes using the idea of visual cryptography. Then, we propose a QR code scheme with high security by combining the fragment coding with the commitment technique. Finally, an enhanced QR code-based secure e-coupon transaction framework is presented, which has a triple-verification feature and supports both online and offline scenarios. The following properties are provided: high information confidentiality, difficult to tamper with and forge, and the ability to resist against collusion attacks. Furthermore, the performance evaluation of computing and communication overhead is given to show the efficiency of the proposed framework.<\/jats:p>","DOI":"10.3233\/jcs-191416","type":"journal-article","created":{"date-parts":[[2020,7,24]],"date-time":"2020-07-24T15:59:56Z","timestamp":1595606396000},"page":"577-605","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":2,"title":["EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions"],"prefix":"10.1177","volume":"28","author":[{"given":"Rui","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Computer Science, University or Victoria, Victoria, Canada"}]},{"given":"Jun","family":"Song","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, Hubei, China"}]},{"given":"Zhiming","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University or Victoria, Victoria, Canada"}]},{"given":"Jianping","family":"Pan","sequence":"additional","affiliation":[{"name":"Department of Computer Science, University or Victoria, Victoria, Canada"}]}],"member":"179","published-online":{"date-parts":[[2020,7,24]]},"reference":[{"key":"ref001","doi-asserted-by":"crossref","unstructured":"J.Black, P.Rogaway and T.Shrimpton, Black-box analysis of the block-cipher-based hash-function constructions from PGV, in: Annual International Cryptology Conference, Springer, 2002, pp. 320\u2013335.","DOI":"10.1007\/3-540-45708-9_21"},{"key":"ref002","doi-asserted-by":"crossref","unstructured":"E.Brickell, J.Camenisch and L.Chen, Direct anonymous attestation, in: Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM, 2004, pp. 132\u2013145.","DOI":"10.1145\/1030083.1030103"},{"key":"ref003","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.062612.00109"},{"key":"ref004","doi-asserted-by":"publisher","DOI":"10.1109\/AsiaJCIS.2015.10"},{"key":"ref005","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1680-8"},{"key":"ref006","doi-asserted-by":"crossref","unstructured":"L.Chen, P.Morrissey and N.P.Smart, DAA: Fixing the pairing based protocols,\n                      Cryptology ePrint Archive\n                      (2009).","DOI":"10.1109\/CINC.2009.116"},{"key":"ref007","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110310"},{"key":"ref008","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819125"},{"key":"ref009","doi-asserted-by":"crossref","unstructured":"C.\u00a0Dobraunig, M.\u00a0Eichlseder and F.\u00a0Mendel, Analysis of SHA-512\/224 and SHA-512\/256, in: International Conference on the Theory and Application of Cryptology and Information Security, Springer, 2015, pp.\u00a0612\u2013630.","DOI":"10.1007\/978-3-662-48800-3_25"},{"key":"ref010","doi-asserted-by":"crossref","unstructured":"M.Eichlseder, F.Mendel and M.Schl\u00e4ffer, Branching heuristics in differential collision search with applications to SHA-512, in: International Workshop on Fast Software Encryption, Springer, 2014, pp. 473\u2013488.","DOI":"10.1007\/978-3-662-46706-0_24"},{"key":"ref011","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102369"},{"key":"ref012","doi-asserted-by":"publisher","DOI":"10.1007\/11780656_34"},{"key":"ref013","unstructured":"Geography \u2013 Statistics Canada, (2016), https:\/\/www150.statcan.gc.ca\/n1\/pub\/11-402-x\/2012000\/chap\/geo\/geo-eng.htm."},{"key":"ref014","doi-asserted-by":"crossref","unstructured":"H.Gilbert and H.Handschuh, Security analysis of SHA-256 and sisters, in: International Workshop on Selected Areas in Cryptography, Springer, 2003, pp. 175\u2013193.","DOI":"10.1007\/978-3-540-24654-1_13"},{"key":"ref015","unstructured":"O.Goldreich, Foundations of Cryptography, Cambridge University Press, 2007."},{"key":"ref016","doi-asserted-by":"publisher","DOI":"10.1109\/RADIOELEK.2016.7477370"},{"key":"ref017","doi-asserted-by":"crossref","unstructured":"R.Hasan, R.Sion and M.Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, in: Proccedings of the 7th Conference on File and Storage Technologies, Vol. 9, USENIX Association, 2009, pp. 1\u201314.","DOI":"10.1145\/1629080.1629082"},{"key":"ref018","doi-asserted-by":"crossref","unstructured":"J.He and W.Jiang, Understanding users\u2019 coupon usage behaviors in e-commerce environments, in: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA\/IUCC), IEEE, 2017, pp. 1047\u20131053.","DOI":"10.1109\/ISPA\/IUCC.2017.00159"},{"key":"ref019","unstructured":"INET Framework, https:\/\/inet.omnetpp.org."},{"key":"ref020","doi-asserted-by":"crossref","unstructured":"S.Kelly and S.Frankel, Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec, Technical Report, 2007.","DOI":"10.17487\/rfc4868"},{"key":"ref021","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.103"},{"key":"ref022","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.84"},{"key":"ref023","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0543-7"},{"key":"ref024","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-016-0155-0"},{"key":"ref025","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2007.906878"},{"key":"ref026","doi-asserted-by":"crossref","unstructured":"R.Liu, J.Song, Z.Huang and J.Pan, EQRC: An enhanced QR code-based secure e-coupon transaction framework, in: ICC 2019\u20132019 IEEE International Conference on Communications (ICC), IEEE, 2019, pp. 1\u20136.","DOI":"10.1109\/ICC.2019.8761258"},{"key":"ref027","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0201-3"},{"key":"ref028","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1540-z"},{"key":"ref029","doi-asserted-by":"crossref","unstructured":"V.Mavroeidis and M.Nicho, Quick response code secure: A cryptographically secure anti-phishing tool for QR code attacks, in: International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, Springer, 2017, pp. 313\u2013324.","DOI":"10.1007\/978-3-319-65127-9_25"},{"key":"ref030","doi-asserted-by":"crossref","unstructured":"F.Mendel, T.Nad and M.Schl\u00e4ffer, Improving local collisions: New attacks on reduced SHA-256, in: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 2013, pp. 262\u2013278.","DOI":"10.1007\/978-3-642-38348-9_16"},{"key":"ref031","unstructured":"A.J.Menezes, J.Katz, P.C.Van Oorschot and S.A.Vanstone, Handbook of Applied Cryptography, CRC press, 1996."},{"key":"ref032","doi-asserted-by":"crossref","unstructured":"X.Nan, Y.He and L.Guan, Optimal resource allocation for multimedia cloud based on queuing model, in: 2011 IEEE 13th International Workshop on Multimedia Signal Processing, IEEE, 2011, pp. 1\u20136.","DOI":"10.1109\/MMSP.2011.6093813"},{"key":"ref033","doi-asserted-by":"crossref","unstructured":"M.Naor and A.Shamir, Visual cryptography, in: Workshop on the Theory and Application of Cryptographic Techniques, Springer, 1994, pp. 1\u201312.","DOI":"10.1007\/BFb0053419"},{"key":"ref034","unstructured":"OMNeT++, https:\/\/omnetpp.org."},{"key":"ref035","unstructured":"M.Scott, Efficient implementation of cryptographic pairings, 2007, http:\/\/www.pairing-conference.org\/2007\/invited\/Scottslide.pdf."},{"key":"ref036","doi-asserted-by":"publisher","DOI":"10.1109\/CICN.2016.64"},{"key":"ref037","doi-asserted-by":"crossref","unstructured":"S.Sung, J.Lee, J.Kim, J.Mun and D.Won, Security analysis of mobile authentication using QR-codes, in: Computer Science & Information Technology-Computer Science Conference Proceedings, 2015.","DOI":"10.5121\/csit.2015.51612"},{"key":"ref038","doi-asserted-by":"crossref","unstructured":"R.Tarabu\u0163\u0103, D.Balan, A.Potorac and A.Graur, Performance investigation over 802.11 ac communication environment, in: 2016 22nd International Conference on Applied Electromagnetics and Communications (ICECOM), IEEE, 2016, pp. 1\u20135.","DOI":"10.1109\/ICECom.2016.7843894"},{"key":"ref039","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2016.021"},{"key":"ref040","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2506546"},{"key":"ref041","doi-asserted-by":"crossref","unstructured":"S.Turner and L.Chen, Updated security considerations for the MD5 message-digest and the HMAC-MD5 algorithms, Technical Report, 2011.","DOI":"10.17487\/rfc6151"},{"key":"ref042","unstructured":"D.Wave, Information technology automatic identification and data capture techniques QR code bar code symbology specification,\n                      International Organization for Standardization, ISO\/IEC\n                      18004\n                      (2015)."},{"key":"ref043","doi-asserted-by":"crossref","unstructured":"Wikstr and M.Douglas, A commitment-consistent proof of a shuffle, in: Information Security & Privacy, Australasian Conference, Australia, 2009.","DOI":"10.1007\/978-3-642-02620-1_28"},{"key":"ref044","doi-asserted-by":"crossref","unstructured":"Z.F.Yan, Y.L.Shen, W.J.Liu, J.M.Long and Q.Wei, An e-commerce coupon target population positioning model based on random forest and extreme gradient boosting, in: 2018 11th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI), IEEE, 2018, pp. 1\u20135.","DOI":"10.1109\/CISP-BMEI.2018.8633247"},{"key":"ref045","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.928581"},{"key":"ref046","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480761"},{"key":"ref047","doi-asserted-by":"crossref","unstructured":"X.Zhang, H.Li, Y.Yang, G.Sun and G.Chen, LIPPS: Logistics information privacy protection system based on encrypted QR code, in: Trustcom\/BigDataSE\/ISPA, IEEE, 2016, pp. 996\u20131000.","DOI":"10.1109\/TrustCom.2016.0167"}],"container-title":["Journal of Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191416","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JCS-191416","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JCS-191416","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T20:45:24Z","timestamp":1777495524000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JCS-191416"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,24]]},"references-count":47,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2020,9,28]]}},"alternative-id":["10.3233\/JCS-191416"],"URL":"https:\/\/doi.org\/10.3233\/jcs-191416","relation":{},"ISSN":["0926-227X","1875-8924"],"issn-type":[{"value":"0926-227X","type":"print"},{"value":"1875-8924","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,24]]}}}