Filters








63 Hits in 2.5 sec

Security Aspects of the Ecash™ Payment System [chapter]

Berry Schoenmakers
1998 Lecture Notes in Computer Science  
ecash TM is a payment system designed and implemented for making purchases over open networks such as the Internet.  ...  The central notion of an electronic coin is treated in detail, and the basic protocols manipulating coins are described.  ...  The work on the CAFE system indicates that this type of payment systems can be implemented in a practical way.  ... 
doi:10.1007/3-540-49248-8_16 fatcat:bcdfatmh2fc3tpg4uw4qcw5yqm

Practical Design And Implementation Of A Mobile Off-Line E-Wallet

Mbouassa Edmond Yannick, Hu Dong Hui
2019 Zenodo  
For developing countries and third world countries this is still a problem. In some areas of the world having a permanent access to internet connection is still a luxury that many cannot afford.  ...  However, the user will still need an internet connection to contact the bank for registration, cash withdrawal and deposit, once the cash is downloaded; users can pay or transfer cash to others without  ...  As for divisibility, Eng and Okamoto proposed a single-term divisible e-cash [16] which is not a practical divisible e-cash.  ... 
doi:10.5281/zenodo.3252959 fatcat:iwu3rq5tdbbhxlem6jq6wh3twy

Designing a generic payment service

J. L. Abad Peiro, N. Asokan, M. Steiner, M. Waidner
1998 IBM Systems Journal  
It was somewhat confusing because certain practical implementations of cash-like payment systems, such as DigiCash’s ecash also have a notion of an “account” in the bank.  ...  For exampie, a user who has a credit-card account, an instance of a stored-value card, and an ecash account will have three separate purses associated with each of the above.  ... 
doi:10.1147/sj.371.0072 fatcat:qsosndww4rd5bidynmzajo6rne

Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions [chapter]

Ethan Heilman, Foteini Baldimtsi, Sharon Goldberg
2016 Lecture Notes in Computer Science  
Blind signatures and Bitcoin transaction contracts (aka smart contracts) ensure the anonymity and fairness during the bitcoin ↔ voucher exchange. Our schemes are practical, secure and anonymous.  ...  We use an untrusted third party to issue anonymous vouchers which users redeem for Bitcoin.  ...  We thank Dimitris Papadopoulos, Ann Ming Samborski and the anonymous reviewers for comments on this draft. This work was funded by the National Science Foundation under grants 1012910 and 1350733.  ... 
doi:10.1007/978-3-662-53357-4_4 fatcat:rl77qre3ebcu5m2w4nsoqhfdz4

An efficient ID-based partially blind signature scheme and application in electronic-cash payment system

Mahender Kumar, C.P. Katti
2016 ACCENTS Transactions on Information Security  
A kind of blind signature, partially blind signature, allows a user to request the signatory authority on some pre-shared information such that signatory authority only sign the message but could not able  ...  Fort this reason, we present a novel efficient identity-based partially blind signature scheme (ID-PBS) based on the hardness of gap Diffie-Hellman problem and elliptic curve discrete logarithm problem  ...  Acknowledgment This research work has been partially supported by the Council of Scientific and Industrial Research, a research and development organisation in India, with sanctioned no. 09/263(1052)/2015  ... 
doi:10.19101/tis.2017.26002 fatcat:s4jbj5aehfbi7dwu3y5mzxscj4

Implementing regular cash with blind fixed-value electronic coins

Dimitrios Lekkas, Diomidis Spinellis
2007 Computer Standards & Interfaces  
We exploit the strong security characteristics of a typical tamperproof device such as a smart card, and the trust services provided by a Public Key Infrastructure.  ...  The proposed scheme simulates the issuance, circulation and characteristics of conventional cash and satisfies important security, privacy and usability requirements, offering a comparative advantage over  ...  Ease of use: The coin exchange process is transparent for the end-user, who practically performs a transaction in three steps: a) identifies the payee through a public directory, by means of her digital  ... 
doi:10.1016/j.csi.2006.01.005 fatcat:ib5lgcgoibbu7ftsk4yxcsvrye

Efficient Arbitrarily Divisible E-cash Applicable to Secure Massive Transactions

Jianhua Liu
2019 IEEE Access  
A conventional divisible E-cash (DEC) system allows each user to withdraw a coin of value 2 n , then spend it in several times by dividing it into small ones of value 2 l , for some l ∈ {0, 1, · · · ,  ...  Our schemes are quite practical for users/merchants using resource-constrained mobile devices. INDEX TERMS Bilinear pairings, divisible E-cash, linked list, random oracle model, standard model.  ...  An Ecash system is called a Arbitrarily Divisible E-cash(ADEC) system if it follows, users withdraw a coin(or coins) of value d at once, but can spend a coin(coins) of any value s at once, there n, s ∈  ... 
doi:10.1109/access.2019.2915053 fatcat:bwbtrfl5h5drpp5xd5ipqtul5u

How to issue a central bank digital currency

David Chaum, Christian Grothoff, Thomas Moser
2021 Social Science Research Network  
The views expressed in this paper are those of the author(s) and do not necessarily represent those of the Swiss National Bank. Working Papers describe research in progress.  ...  these are of an individual character).  ...  The actual implementation of eCash by the DigiCash company in the 1990s is documented at https://www.chaum.com/ecash.  ... 
doi:10.2139/ssrn.3965032 fatcat:7i2fhwgq2rex5es5r4uq7ahhfq

Formal Analysis of E-Cash Protocols

Jannik Dreier, Ali Kassem, Pascal Lafourcade
2015 Proceedings of the 12th International Conference on Security and Cryptography  
In this paper, we propose a formal framework to define, analyze, and verify security properties of e-cash systems.  ...  ., which has two variants and a real implementation based on it. Using ProVerif, we demonstrate that our framework is suitable for an automated analysis of this protocol.  ...  A real implementation based on these two variants, allowing users to make purchases over open networks such as the Internet, was put in service by DigiCash Inc.  ... 
doi:10.5220/0005544500650075 dblp:conf/secrypt/DreierKL15 fatcat:otpekpy3sjeetcghnkqb7dgm7q

Copy Prevention Scheme for Rights Trading Infrastructure [chapter]

Masayuki Terada, Hiroshi Kuno, Masayuki Hanadate, Ko Fujimura
2000 Smart Card Research and Advanced Applications  
Acknowledgments We wish to thank all the members of the FlexTicket project, especially Yasuna.o Mizuno, Yoshihito Oshima, Yoshiaki Nakajima, Nobuyuki Chiwata, Makoto Iguchi, and Jun Sekine.  ...  reproduction, and guarantee security such as ensuring privacy. 3 It must be practical to implement in terms of efficiency and convenience.  ...  Each of the participants and the transactions are defined below. 2.1.1 Participants. Issuer A participant who issues and underwrites digital rights.  ... 
doi:10.1007/978-0-387-35528-3_4 fatcat:366dft2u5vehdendsgq5u7pxpu

Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture

Stefanos Gritzalis, Sokratis K Katsikas, Dimitrios Lekkas, Konstantinos Moulinos, Eleni Polydorou
2000 Computers & security  
In this paper, the unified, abstract KEYSTONE Public Key Infrastructure is presented.This architecture consists of a reference model, a functional architecture specification, and a set of technologies  ...  enjoys all the desirable characteristics and fulfils all those criteria that are essential for a PKI to constitute a successful framework for the development of inter-domain and international Trusted Services  ...  PKI Services and Functions Previous attempts [16] to define a set of services that a PKI should be offering were not user-needs-oriented.  ... 
doi:10.1016/s0167-4048(00)08022-6 fatcat:kbbw75pw5faefhru5lmvqgi6x4

Reengineering money: the Mondex stored value card and beyond

E.K. Clemons, D.C. Croson, B.W. Weber
1996 Proceedings of HICSS-29: 29th Hawaii International Conference on System Sciences  
After analyzing the economics of the proposed Mondex electronic cash system, including suggesting sources of gain for multiple channel members, we conclude that the major challenges in the global implementation  ...  of electronic currency will be establishing the proper incentives for channel members, regulatory bam'ers, and gaining critical mass of consumer and merchant acceptance rather than difficulties with technology  ...  it is adopted, but rather issues of channel coordination, consumer acceptance, and merchant acceptance. numbers like physical bills), making the user anonymous for all practical purposes if desired.  ... 
doi:10.1109/hicss.1996.495345 dblp:conf/hicss/ClemonsCW96 fatcat:z34hkfow7vhezck7txdssgum2i

Reengineering Money: The Mondex Stored Value Card and Beyond

Eric K. Clemons, David C. Croson, Bruce W. Weber
1996 International Journal of Electronic Commerce  
After analyzing the economics of the proposed Mondex electronic cash system, including suggesting sources of gain for multiple channel members, we conclude that the major challenges in the global implementation  ...  of electronic currency will be establishing the proper incentives for channel members, regulatory bam'ers, and gaining critical mass of consumer and merchant acceptance rather than difficulties with technology  ...  it is adopted, but rather issues of channel coordination, consumer acceptance, and merchant acceptance. numbers like physical bills), making the user anonymous for all practical purposes if desired.  ... 
doi:10.1080/10864415.1996.11518281 fatcat:hg33rfpbujfyvad65zvaclvia4

SoK of Used Cryptography in Blockchain [article]

Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019 arXiv   pre-print
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions.  ...  To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed  ...  Privacy can be defined as data privacy and user privacy (anonymity).  ... 
arXiv:1906.08609v3 fatcat:l62esrum3bhmfcdxzpx3h3he4e

Divisible E-Cash in the Standard Model [chapter]

Malika Izabachène, Benoît Libert
2013 Lecture Notes in Computer Science  
One of the main desirable properties is anonymity: spending a coin should not reveal the identity of the spender and, at the same time, users should not be able to double-spend coins without being detected  ...  The scheme allows a user to obtain a wallet of 2 L coins by running a withdrawal protocol with the bank.  ...  In 2005, Camenisch, Hohenberger and Lysyanskaya [10] described a compact ecash system allowing a user to withdraw a wallet of 2 L coins with a computational cost of O(L + λ), where λ is the security  ... 
doi:10.1007/978-3-642-36334-4_20 fatcat:wamsnmlbhbgu5hganx6slmngqu
« Previous Showing results 1 — 15 out of 63 results