Enhancing Privacy of Electronic Coins through Cryptography
نویسندگان
چکیده
In computerized world there are different sites without further ado has the circumstances where individuals execute and the exchange is for the most part done by the money and money is presently electronic. Focal thought of this paper is to think about Al the electronic money framework. This paper portrays how the every one of the conventions works, their properties and different parameters favorable circumstances inconveniences. At long last, it finishes up by correlation of every one of these conventions.
منابع مشابه
Efficient Cryptography for Information Privacy
of “Efficient Cryptography for Information Privacy” by Foteini Baldimtsi, Ph.D., Brown University, May 2014. In the modern digital society, individuals, businesses and governments perform numerous everyday tasks such as shopping, banking and commuting using electronic media. Although these electronic transactions provide efficiency and convenience, they usually overlook the privacy of the users...
متن کاملMarking: A Privacy Protecting Approach Against Blackmailing
Electronic payment systems based on anonymous coins have been invented as a digital equivalent to physical banknotes. However, von Solms and Naccache discovered that such anonymous coins are also very well suited to support criminals in blackmailing. In this paper we present a payment system, which has an efficient tracing and revocation mechanism for blackmailed coins. The used tracing method ...
متن کاملCombining End-To-End Voting With Trustworthy Computing for Greater Privacy, Trust, Accessibility, and Usability (summary)
We advocate combining Trustworthy Computing (TC) techniques—including Trusted Platform Module (TPM) protocols, application attestation, and reduced software footprints—with end-toend (E2E) technologies, to provide voter and universal verifiability while enhancing privacy, accessibility, and usability through trustworthy electronic systems. Current voting approaches with paper, electronic, and e...
متن کاملEnterprise Security: Legal Challenges and Possible Solutions
To survive in the business, especially the online, world, an enterprise requires an effective security infrastructure. However, enterprises should bear in mind that there is often also a legal obligation to keep certain data or information secure, emanating from legislation such as intellectual property, data protection or trade secret legislation or from contract. A number of technological mea...
متن کاملA new untraceable off-line electronic cash system
Digital content transactions through e-commerce will grow tremendously in the coming years. In this respect, well-designed electronic payment schemes and high-quality digital contents are two critical factors. Untraceable electronic cash schemes make it possible for customers to pay the e-cash to the merchants through communication networks under privacy protection. Therefore, there is a need t...
متن کامل