Off-line anonymous electronic money, Other Subject

Assignment Help:

OFF-LINE ANONYMOUS ELECTRONIC MONEY

In off-line electronic money the merchant does not require to cooperate with the bank before accepting a coin from the user. In its place he can gather multiple coins Spent by users and Deposit them later with the bank. In standard this could be done off-line, i.e. the merchant could go to the bank with his storage media to switch e-cash for cash. On the other hand the merchant is certain that the user's e-coin will either be established by the bank, or the bank will be proficient to recognize and punish the cheating user. In this way a user is prohibited from spending the similar coin twice (double-spending). Off-line e-cash schemes too need to look after against cheating merchants, i.e. merchants that desire to deposit a coin twice (and then blame the user).

Using cryptography, unidentified e-cash was come in to existence by David Chaum. He used blind signatures to get unlink ability between extraction and spend transactions. In cryptography, e-cash generally refers to unidentified e-cash. Depending on the properties of the payment transactions, one difference between off-line and on-line e-cash. The first off-line e-cash system was planned by Chaum and Naor. Like the first on-line scheme, it is based on RSA blind signatures.


Related Discussions:- Off-line anonymous electronic money

House holds, What are the causes of the increase in the female headed house...

What are the causes of the increase in the female headed households

Human nutrition, Human nutrition is a very vast and profound topic that has...

Human nutrition is a very vast and profound topic that has always been extensively taught and read about in every part of the world. Considering man to be the most developed being

Future evolution of electronic currency, FUTURE EVOLUTION The major foc...

FUTURE EVOLUTION The major focuses of digital cash development are 1) being proficient to use it throughout a wider range of hardware for example secured credit cards; and

NXC C programs, A description of each function used in the program. Theree...

A description of each function used in the program. Theree programs: /* HiTechnic Experimenter''s Kit Program Experiment - 6 Reaction Time Measurement This program measures t

Medical Terminology, Identify ten diagnostic medical terms that use diagnos...

Identify ten diagnostic medical terms that use diagnostic suffixes, note the suffixes, AND provide definitions. Then identify ten RELATED procedural medical terms that use proce

Research project, 1. Title 2. Background 3. Problem statements 4. Research ...

1. Title 2. Background 3. Problem statements 4. Research questions 5. Objectives 6. Literature review 7. Hyperthesis 8. Methods/Plan 9. Conclusion 10.References

Electricity, when do we use the rule power equal voltage times intencity?

when do we use the rule power equal voltage times intencity?

Why internet is insecure, WHY INTERNET IS INSECURE? Theft of Personal...

WHY INTERNET IS INSECURE? Theft of Personal information If you make use of the Internet, you may be facing serious danger as your private information such as name, addres

Simple b2b connectivity using punchout, Simple B2B Connectivity Using Punch...

Simple B2B Connectivity Using Punchout Now, let's focus on two of the B2B connectivity problems previously mentioned, and illustrated in Figure 1.5. First, let's discuss the su

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd