2,344 research outputs found
Recommended from our members
Easy come-easy go divisible cash
Recently, there has been an interest in making electronic cash protocols more practical for electronic commerce by developing e-cash which is divisible (e.g., a coin which can be spent incrementally but total purchases are limited to the monetary value of the coin). In Crypto`95, T. Okamoto presented the first practical divisible, untraceable, off-line e-cash scheme, which requires only O(log N) computations for each of the withdrawal, payment and deposit procedures, where N = (total coin value)/(smallest divisible unit). However, Okamoto`s set-up procedure is quite inefficient (on the order of 4,000 multi-exponentiations and depending on the size of the RSA modulus). The authors formalize the notion of range-bounded commitment, originally used in Okamoto`s account establishment protocol, and present a very efficient instantiation which allows one to construct the first truly efficient divisible e-cash system. The scheme only requires the equivalent of one (1) exponentiation for set-up, less than 2 exponentiations for withdrawal and around 20 for payment, while the size of the coin remains about 300 Bytes. Hence, the withdrawal protocol is 3 orders of magnitude faster than Okamoto`s, while the rest of the system remains equally efficient, allowing for implementation in smart-cards. Similar to Okamoto`s, the scheme is based on proofs whose cryptographic security assumptions are theoretically clarified
A Digital Cash Paradigm with Valued and No-Valued e-Coins
Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different approaches to avoid the double-spending fraud, or features like divisibility or transferability. This paper presents a new digital cash paradigm that includes the so-called no-valued e-coins, which are e-coins that can be generated free of charge by customers. A vendor receiving a payment cannot distinguish whether the received e-coin is valued or not, but the customer will receive the requested digital item only in the former case. A straightforward application of bogus transactions involving no-valued e-coins is the masking of consumption patterns. This new paradigm has also proven its validity in the scope of privacy-preserving pay-by-phone parking systems, and we believe it can become a very versatile building block in the design of privacy-preserving protocols in other areas of research. This paper provides a formal description of the new paradigm, including the features required for each of its components together with a formal analysis of its security.This research was funded by the Spanish Ministry of Science, Innovation and Universities grant number MTM2017-83271-R
Anonymous reputation based reservations in e-commerce (AMNESIC)
Online reservation systems have grown over the last recent
years to facilitate the purchase of goods and services. Generally,
reservation systems require that customers provide
some personal data to make a reservation effective. With
this data, service providers can check the consumer history
and decide if the user is trustable enough to get the reserve.
Although the reputation of a user is a good metric to implement
the access control of the system, providing personal
and sensitive data to the system presents high privacy risks,
since the interests of a user are totally known and tracked
by an external entity. In this paper we design an anonymous
reservation protocol that uses reputations to profile
the users and control their access to the offered services, but
at the same time it preserves their privacy not only from the
seller but the service provider
Inflation, Prices, and Information in Competitive Search
We study the effects of inflation in a competitive search model where each buyerâs utility is private information, and money is essential. The equilibrium is efficient at the Friedman rule, but inflation creates an inefficiency in the terms of trade. Buyers experience a preference shock after they are matched with a seller, and thus they have a precautionary motive for holding money. Sellers, who compete to attract buyers, post non-linear price schedules. As inflation rises, sellers post relatively flat price schedules, which reduce the need for precautionary balances. These price schedules induce buyers with a low desire to consume to purchase inefficiently high quantities because of the low marginal cost of purchasing goods. In contrast, buyers with a high desire to consume purchase inefficiently low quantities as they face binding liquidity constraints. The model fits historical US data on velocity and interest rates.Publicad
The Evolution of Embedding Metadata in Blockchain Transactions
The use of blockchains is growing every day, and their utility has greatly
expanded from sending and receiving crypto-coins to smart-contracts and
decentralized autonomous organizations. Modern blockchains underpin a variety
of applications: from designing a global identity to improving satellite
connectivity. In our research we look at the ability of blockchains to store
metadata in an increasing volume of transactions and with evolving focus of
utilization. We further show that basic approaches to improving blockchain
privacy also rely on embedding metadata. This paper identifies and classifies
real-life blockchain transactions embedding metadata of a number of major
protocols running essentially over the bitcoin blockchain. The empirical
analysis here presents the evolution of metadata utilization in the recent
years, and the discussion suggests steps towards preventing criminal use.
Metadata are relevant to any blockchain, and our analysis considers primarily
bitcoin as a case study. The paper concludes that simultaneously with both
expanding legitimate utilization of embedded metadata and expanding blockchain
functionality, the applied research on improving anonymity and security must
also attempt to protect against blockchain abuse.Comment: 9 pages, 6 figures, 1 table, 2018 International Joint Conference on
Neural Network
(WP 2013-09) Virtual Currency and the Financial System: The Case of Bitcoin
Technological development and the increased use of the internet have led to the proliferation of virtual communities. Some of these communities have created and circulated their own currency for exchanging goods and services. Bitcoin is currently the most popular among these virtual or digital currencies and has been in news recently because of the wild fluctuations in its âvalueâ and also significant venture capital investment in entities associated with it.1 Bitcoin is relevant in several areas of the financial system and is therefore of interest to central banks, consumers and investors. Digital currencies are part of a broader group of virtual currencies that include credit card points, air miles, loyalty points and coupons (Chart 1). With the advent of the Internet, mobile devices and detailed consumer information, companies are increasingly using digital currencies as a marketing tool. As a result, there has been a sharp increase in the use of digital currencies, particularly for app-based coins and tokens, mobile coupons, and personal data exchanged for digital content. As these trends evolve, digital currencies have the potential to become more popular and compete with traditional currencies. This paper aims to provide some clarity in particular on Bitcoin, its role and potential future use in the financial system and the risks associated with this form of digital currency.. It will begin by providing a short introduction to the Bitcoin network as well as describe the benefits of allowing the Bitcoin network to develop and innovate. It will highlight concerns for consumers, policymakers and financial regulators. Next it will analyze the role that Bitcoin could play in the financial system. The paper will conclude by providing recommendations to address policymakersâ concerns while allowing for further innovation within the Bitcoin network. An initial comprehensive overview of this kind is absent from the existing literature. This paper intends to fill that gap in the literature
Market-Based Allocation with Indivisible Bids
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/73571/1/j.1937-5956.2007.tb00275.x.pd
- âŠ