Non-repudiation achieved in designing e-cash based system, Computer Engineering

How can non-repudiation be achieved into designing e-cash based system?

E-cash is fundamentally an online solution. The buyer should validate the coins by the issuer so as to get the purchase completed. The coins used within the system comprise the value of the coin, the serial number which is unique for each coin and identity strings connecting the coin to the user withdrawing this. Conversely, neither the issuer nor the merchant can infer the identity of the customer by examining the coins when the coin is used only once.

The user of the e-cash system should have an account into a bank which is a certified eCash minter. The secret splitting and blind signature techniques are used, which makes sure that the coins are anonymous till used twice. The appropriate algorithm is RSA and DES.

Posted Date: 8/13/2013 6:51:55 AM | Location : United States







Related Discussions:- Non-repudiation achieved in designing e-cash based system, Assignment Help, Ask Question on Non-repudiation achieved in designing e-cash based system, Get Answer, Expert's Help, Non-repudiation achieved in designing e-cash based system Discussions

Write discussion on Non-repudiation achieved in designing e-cash based system
Your posts are moderated
Related Questions
design modulo 12 up synchronous counter using t flip flop

Q. How to insert script in dreamweaver? Step 1: Click on Insert Step 2: Click on Script Step 3: Choose the type of Script Step 4: Write the code in "Content" Step 5: T


What is write-through protocol? For a write operation using write-through protocol during write-hit: The cache location and the major memory location are updated concurrently.

Explain Tri-state logic inverter with the help of a circuit diagram. Give its Truth Table. Ans: Tri-state Logic Inverter: The functional diagram of Tri-state Logic Inve

Execute the following functionality using Java & SQL with simple GUI interface: 1.  Insert/delete/update an XML document.  2.  Insert/delete/update a category.  3.  Alloca

Q. What is Multiple Interrupt Lines? Multiple Interrupt Lines: Simplest solution to problems above is to provide multiple interrupt lines that will result in immediate recognit

Q. Explain about Karnaugh Maps? Karnaugh maps are a suitable way of expressing and simplifying Boolean function of 2 to 6 variables. The stepwise process for Karnaugh map is.

Firewalls use one or more of three methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are examined against a s

Types Of Classification The following classification of parallel computers have been recognized: 1)      Categorization based on the data streams and instruction 2)