e money digital cash
Download
Skip this Video
Download Presentation
E-Money / Digital Cash

Loading in 2 Seconds...

play fullscreen
1 / 8

E-Money - PowerPoint PPT Presentation


  • 199 Views
  • Uploaded on

E-Money / Digital Cash. Lin Huang. Money / Digital Cash. What is Money Coins, Bill – can’t exist on two places at one time Bearer bonds: immediate cashable Gold, Silver: portable money With Qualities: Difficulty to counterfeit, immediate settle-able, untraceable. Digital cash.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'E-Money ' - elsbeth


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
money digital cash
Money / Digital Cash
  • What is Money
    • Coins, Bill – can’t exist on two places at one time
    • Bearer bonds: immediate cashable
    • Gold, Silver: portable money

With Qualities: Difficulty to counterfeit, immediate settle-able, untraceable.

digital cash
Digital cash
  • Two types of E-money
    • Identified e-money
    • Anonymous e-money, or digital cash
  • Ideal Digital Cash system:
    • Independency (transfer through network)
    • Security (not copied or re-used)
    • Privacy (untraceable)
    • Offline payment (peer to peer)
    • Tranferability (to another person)
    • Divisibility (digital cash can be divided ito smaller amount)
protocol consideration
Protocol Consideration
  • Consumer: Privacy; Security; Protection; Regulation
  • Business: Availability of anonymity; Cost and ease of acquisition; Availability; Risk of fraud; Libility for fraud.
  • Financial And Government: Consumer protection; Financial loss; Privacy vs fighting crime; Federal reserve regarding the money.
  • Technical Challenges: Anonymous spending; Privacy; Preventing fraud, like double spending; Cost effective
protocols
Protocols
  • What’s on the market (all extending based on existing credit card, debit card, banking system. No anonymity)
    • BT click&buy
    • Cellular phone (Simpay; others like pre-paid phone card, send money through phone)
    • PayPal (CyperCash)
    • Microsoft points system
  • DigiCash – David Chaum
david chaum
David Chaum
  • Blind Signature: to provide anonymity
    • What a normal protocol looks like (using PKI)
      • Alice: sign for a note with money order + SerialNum
      • Bank: verify and sign the note + deduct her account
      • Alice use the note signed by bank to Bob for service or product
      • Bob verify bank signature, and send note to bank
      • Bank verify its signature and SerialNum not claimed before, put proper money into Bob’s account
david chaum 2
David Chaum (2)
  • Change above to provide anonymity
    • Alice: sign for a note with money order + SerialNu. Do this for 100 envelop for instance. Generating Anonymous by process of blinding.
    • Bank: verify the note by read 99 envelop (cut-and choose protocol, ask Alice to unblind those 99) + deduct her account + sign the last one without open
    • Alice use the note (by unblinding it) signed by bank to Bob for service or product.
    • Bob verify bank signature, and send note to bank
    • Bank verify its signature and SerialNum not claimed before, put proper money into Bob’s account. However, bank won’t know where the original money come from (it doesn’t know the SerialNum)
david chaum 3
David Chaum (3)
  • Prevent double spending
    • Bank needs to know who the double spender is: Alice or Bob?
      • Alice: sign for n notes with money order + SerialNum + Identity info pairs (identity pair using secrete splitting and bit commitment protocol)
      • Bank: ask Alice to unblind n-1 notes and reveal identity; when satisfy, sign the last blind note.
      • Alice unblind the note and give to Bob
      • Bob verify bank signature
      • Bank verify its signature and SerialNum not claimed before, put proper money into Bob’s account.

Detecting the culprit if SerialNum is re-used.

ad