2,344 research outputs found

    How to Make a Mint: The Cryptography of Anonymous Electronic Cash

    Get PDF

    A Digital Cash Paradigm with Valued and No-Valued e-Coins

    Get PDF
    Digital cash is a form of money that is stored digitally. Its main advantage when compared to traditional credit or debit cards is the possibility of carrying out anonymous transactions. Diverse digital cash paradigms have been proposed during the last decades, providing different approaches to avoid the double-spending fraud, or features like divisibility or transferability. This paper presents a new digital cash paradigm that includes the so-called no-valued e-coins, which are e-coins that can be generated free of charge by customers. A vendor receiving a payment cannot distinguish whether the received e-coin is valued or not, but the customer will receive the requested digital item only in the former case. A straightforward application of bogus transactions involving no-valued e-coins is the masking of consumption patterns. This new paradigm has also proven its validity in the scope of privacy-preserving pay-by-phone parking systems, and we believe it can become a very versatile building block in the design of privacy-preserving protocols in other areas of research. This paper provides a formal description of the new paradigm, including the features required for each of its components together with a formal analysis of its security.This research was funded by the Spanish Ministry of Science, Innovation and Universities grant number MTM2017-83271-R

    Anonymous reputation based reservations in e-commerce (AMNESIC)

    Get PDF
    Online reservation systems have grown over the last recent years to facilitate the purchase of goods and services. Generally, reservation systems require that customers provide some personal data to make a reservation effective. With this data, service providers can check the consumer history and decide if the user is trustable enough to get the reserve. Although the reputation of a user is a good metric to implement the access control of the system, providing personal and sensitive data to the system presents high privacy risks, since the interests of a user are totally known and tracked by an external entity. In this paper we design an anonymous reservation protocol that uses reputations to profile the users and control their access to the offered services, but at the same time it preserves their privacy not only from the seller but the service provider

    Inflation, Prices, and Information in Competitive Search

    Get PDF
    We study the effects of inflation in a competitive search model where each buyer’s utility is private information, and money is essential. The equilibrium is efficient at the Friedman rule, but inflation creates an inefficiency in the terms of trade. Buyers experience a preference shock after they are matched with a seller, and thus they have a precautionary motive for holding money. Sellers, who compete to attract buyers, post non-linear price schedules. As inflation rises, sellers post relatively flat price schedules, which reduce the need for precautionary balances. These price schedules induce buyers with a low desire to consume to purchase inefficiently high quantities because of the low marginal cost of purchasing goods. In contrast, buyers with a high desire to consume purchase inefficiently low quantities as they face binding liquidity constraints. The model fits historical US data on velocity and interest rates.Publicad

    The Evolution of Embedding Metadata in Blockchain Transactions

    Get PDF
    The use of blockchains is growing every day, and their utility has greatly expanded from sending and receiving crypto-coins to smart-contracts and decentralized autonomous organizations. Modern blockchains underpin a variety of applications: from designing a global identity to improving satellite connectivity. In our research we look at the ability of blockchains to store metadata in an increasing volume of transactions and with evolving focus of utilization. We further show that basic approaches to improving blockchain privacy also rely on embedding metadata. This paper identifies and classifies real-life blockchain transactions embedding metadata of a number of major protocols running essentially over the bitcoin blockchain. The empirical analysis here presents the evolution of metadata utilization in the recent years, and the discussion suggests steps towards preventing criminal use. Metadata are relevant to any blockchain, and our analysis considers primarily bitcoin as a case study. The paper concludes that simultaneously with both expanding legitimate utilization of embedded metadata and expanding blockchain functionality, the applied research on improving anonymity and security must also attempt to protect against blockchain abuse.Comment: 9 pages, 6 figures, 1 table, 2018 International Joint Conference on Neural Network

    (WP 2013-09) Virtual Currency and the Financial System: The Case of Bitcoin

    Get PDF
    Technological development and the increased use of the internet have led to the proliferation of virtual communities. Some of these communities have created and circulated their own currency for exchanging goods and services. Bitcoin is currently the most popular among these virtual or digital currencies and has been in news recently because of the wild fluctuations in its ‘value’ and also significant venture capital investment in entities associated with it.1 Bitcoin is relevant in several areas of the financial system and is therefore of interest to central banks, consumers and investors. Digital currencies are part of a broader group of virtual currencies that include credit card points, air miles, loyalty points and coupons (Chart 1). With the advent of the Internet, mobile devices and detailed consumer information, companies are increasingly using digital currencies as a marketing tool. As a result, there has been a sharp increase in the use of digital currencies, particularly for app-based coins and tokens, mobile coupons, and personal data exchanged for digital content. As these trends evolve, digital currencies have the potential to become more popular and compete with traditional currencies. This paper aims to provide some clarity in particular on Bitcoin, its role and potential future use in the financial system and the risks associated with this form of digital currency.. It will begin by providing a short introduction to the Bitcoin network as well as describe the benefits of allowing the Bitcoin network to develop and innovate. It will highlight concerns for consumers, policymakers and financial regulators. Next it will analyze the role that Bitcoin could play in the financial system. The paper will conclude by providing recommendations to address policymakers’ concerns while allowing for further innovation within the Bitcoin network. An initial comprehensive overview of this kind is absent from the existing literature. This paper intends to fill that gap in the literature

    Market-Based Allocation with Indivisible Bids

    Full text link
    Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/73571/1/j.1937-5956.2007.tb00275.x.pd
    • 

    corecore