Non-repudiation achieved in designing e-cash based system, Computer Engineering

How can non-repudiation be achieved into designing e-cash based system?

E-cash is fundamentally an online solution. The buyer should validate the coins by the issuer so as to get the purchase completed. The coins used within the system comprise the value of the coin, the serial number which is unique for each coin and identity strings connecting the coin to the user withdrawing this. Conversely, neither the issuer nor the merchant can infer the identity of the customer by examining the coins when the coin is used only once.

The user of the e-cash system should have an account into a bank which is a certified eCash minter. The secret splitting and blind signature techniques are used, which makes sure that the coins are anonymous till used twice. The appropriate algorithm is RSA and DES.

Posted Date: 8/13/2013 6:51:55 AM | Location : United States

Related Discussions:- Non-repudiation achieved in designing e-cash based system, Assignment Help, Ask Question on Non-repudiation achieved in designing e-cash based system, Get Answer, Expert's Help, Non-repudiation achieved in designing e-cash based system Discussions

Write discussion on Non-repudiation achieved in designing e-cash based system
Your posts are moderated
Related Questions
Explain technical reasons which made Microsoft withdraw its support for VBA in Mac? Ans) The reasons which made Microsoft drop its carry to VBA are as follows, Microsoft visual

a. What are the benefits of hardwired and micro programmed control? b. Sketch neat diagram of single bus organization of CPU showing ALU, all types of registers and the data pat

What do understand by the granularity of a parallel system ? Granularity refers to the quantity of computation complete in parallel relative to the size of the entire program. I

What are the different storage classes in C?  Storage classes in C  There are four storage classes in C:  a. Automatic storage class:  b. Register storage class:  c

Explain the types of hardware used in supermarkets These use many types of specialist I/O hardware. For instance: -  Bar code readers/scanners (to read product details and e

Perform the 23 - 48 operations using the 2's complement method. Ans. Given 23 - 48 firstly add them       23                         0 1 0 1 1 1 - (- 48)                     +

Assignment 4: Handwritten Bangla Numeral Recognition using Multilayer Feed Forward Neural Network. In this assignment, you will design a multi layer feed forward neural network

Height of a tree The length of the longest path from root to any node is called as the height of the tree.

How do active web pages work? Describe with a small example. Active Web Pages: An active document is not completely specified through the server. Instead an active documen

What is the Network Service Access Policy A high-level, issue-specific policy which defines those services that are allowed or denied from the restricted network. It also co