Off-line anonymous electronic money, Other Subject

OFF-LINE ANONYMOUS ELECTRONIC MONEY

In off-line electronic money the merchant does not require to cooperate with the bank before accepting a coin from the user. In its place he can gather multiple coins Spent by users and Deposit them later with the bank. In standard this could be done off-line, i.e. the merchant could go to the bank with his storage media to switch e-cash for cash. On the other hand the merchant is certain that the user's e-coin will either be established by the bank, or the bank will be proficient to recognize and punish the cheating user. In this way a user is prohibited from spending the similar coin twice (double-spending). Off-line e-cash schemes too need to look after against cheating merchants, i.e. merchants that desire to deposit a coin twice (and then blame the user).

Using cryptography, unidentified e-cash was come in to existence by David Chaum. He used blind signatures to get unlink ability between extraction and spend transactions. In cryptography, e-cash generally refers to unidentified e-cash. Depending on the properties of the payment transactions, one difference between off-line and on-line e-cash. The first off-line e-cash system was planned by Chaum and Naor. Like the first on-line scheme, it is based on RSA blind signatures.

Posted Date: 10/12/2012 9:13:44 AM | Location : United States







Related Discussions:- Off-line anonymous electronic money, Assignment Help, Ask Question on Off-line anonymous electronic money, Get Answer, Expert's Help, Off-line anonymous electronic money Discussions

Write discussion on Off-line anonymous electronic money
Your posts are moderated
Related Questions
Question 1: (a) Define Counselling and show how it has evolved from psychotherapy by comparing the two. (b) Describe how the process of counseling uses strategies to bring s

Alternative Systems of E-cash Officially digital money or electronic is a illustration, or a system of credits and debits, used to replace value, inside another system, or itse

Security key In early 2007, PayPal initiate an optional security key as an supplementary safety measure against fraud. A user account attached to a security key has a customize

Question 1: a) Briefly describe Carol Gillighan's theory of Moral development. b) Explain the term 'autonomous morality' as put forward by Piaget and is usefulness in clas

Ancient Art: Since its humble beginnings, art has always been a result of man's intellectual and emotional connection with the world. Its primary aim is to produce a message which

Culture: Culture refers to the knowledge; ways of thinking, feeling and behaving that give each society its coherence and its distinctive way of life. Culture is demonstrated b


As">http://www.delhi.gov.in/wps/wcm/connect/doit_labour/Labour/Home/Acts+Implemented/Summary+of+the+Acts+Implemented/The+Factories+Act-1948 As per above site of Government of Ind

In the article “The New GI Bill Is No Match for the Original” by Milton Greenberg shows comparison between when the first GI Bill of Rights was adopted and the Post 9/11 Veterans E

let f(x,y,z)=xy''+xyz''+x''yz'' show that f(x,y,z)+xz''=f(x,y,z)