Off-line anonymous electronic money, Other Subject

OFF-LINE ANONYMOUS ELECTRONIC MONEY

In off-line electronic money the merchant does not require to cooperate with the bank before accepting a coin from the user. In its place he can gather multiple coins Spent by users and Deposit them later with the bank. In standard this could be done off-line, i.e. the merchant could go to the bank with his storage media to switch e-cash for cash. On the other hand the merchant is certain that the user's e-coin will either be established by the bank, or the bank will be proficient to recognize and punish the cheating user. In this way a user is prohibited from spending the similar coin twice (double-spending). Off-line e-cash schemes too need to look after against cheating merchants, i.e. merchants that desire to deposit a coin twice (and then blame the user).

Using cryptography, unidentified e-cash was come in to existence by David Chaum. He used blind signatures to get unlink ability between extraction and spend transactions. In cryptography, e-cash generally refers to unidentified e-cash. Depending on the properties of the payment transactions, one difference between off-line and on-line e-cash. The first off-line e-cash system was planned by Chaum and Naor. Like the first on-line scheme, it is based on RSA blind signatures.

Posted Date: 10/12/2012 9:13:44 AM | Location : United States







Related Discussions:- Off-line anonymous electronic money, Assignment Help, Ask Question on Off-line anonymous electronic money, Get Answer, Expert's Help, Off-line anonymous electronic money Discussions

Write discussion on Off-line anonymous electronic money
Your posts are moderated
Related Questions
Gothic architecture: In Europe Architectural style that lasted from the mid 12th century to the 16th century, specifically a style of masonry building characterized by cavernous s

Securit y Classification for Information A significant feature of risk management and information security is recognizing the importance of information and defining suitable p

To what extent is it possible to explain schizophrenia from a biological perspective?

Review each of the four components of the revenue cycle (Pre claims, Claims, Accounts Receivable, and Claims, reconciliation and collections) and identify a key staff member involv

why would John Rawls agree that the right of a baker to enter a contract of his choice does not overide the public interest


Ecological Restoration: It is the procedure of assisting the recovery of an ecosystem that has been damaged, degraded or destroyed.  This is an intentional activity which ini

Overtaking Behavior - Driver Behavior One of the most dangerous operations in driving is to overtake another vehicle. The driver's attention is on his way forwards, and someti

a assignment on concept of environment

Applications- Data encryption (cryptography) is utilized in a variety of environments and applications. The exact utilization of encryption and the implementation of the DES w