Anonymous Split E-Cash—Toward Mobile Anonymous Payments
نویسندگان
چکیده
منابع مشابه
Accountable Privacy for Decentralized Anonymous Payments
Decentralized ledger-based currencies such as Bitcoin provide a means to construct payment systems without requiring a trusted bank. Removing this trust assumption comes at the significant cost of transaction privacy. A number of academic works have sought to improve the privacy offered by ledger-based currencies using anonymous electronic cash (e-cash) techniques. Unfortunately, this strong de...
متن کاملAccountable Anonymous E-Mail
Current anonymous e-mail systems offer unconditional anonymity to their users which can provoke abusive behaviour. Dissatisfied users will drop out and liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users when designing anonymous applications. This paper describes the design and ...
متن کاملAnonymous Mobile Conference Calls
This paper describes an architecture and protocol for making anonymous mobile conference calls. A number of examples exist where multiple users may wish to communicate in an anonymous manner, such as anonymous virtual support groups (e.g Alcoholics Anonymous). Anonymous group identification schemes coupled with the novel idea of Virtual Numbers, allows for identification to a conference call fa...
متن کاملAnonymous Transferable E-Cash
Cryptographic e-cash allows off-line electronic transactions between a bank, users and merchants in a secure and anonymous fashion. A plethora of e-cash constructions has been proposed in the literature; however, these traditional e-cash schemes only allow coins to be transferred once between users and merchants. Ideally, we would like users to be able to transfer coins between each other multi...
متن کاملAnonymous Communications for Mobile Agents
Anonymous communication techniques are vital for some types of ecommerce applications. There have been several different approaches developed for providing anonymous communication over the Internet. In this paper, we review key techniques for anonymous communication and describe an alternate anonymous networking approach based on agile agents intended to provide anonymous communication protecti...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Transactions on Embedded Computing Systems
سال: 2015
ISSN: 1539-9087,1558-3465
DOI: 10.1145/2783439