Open Access Open Access  Restricted Access Subscription Access

Electronic Cash System

Ridhdhina Naik

Abstract


Online payments could be sent directly from one party to another without having to go through a financial institution in a peer-to-peer version of electronic cash. Computerized marks give part of the arrangement, however the primary advantages are lost on the off chance that a believed outsider is as yet expected to forestall twofold spending. We propose an answer for the twofold spending issue utilizing a distributed organization. The organization timestamps exchanges by hashing them into a continuous chain of hash-based evidence of-work, framing a record that can't be changed without re-trying the confirmation of-work. The longest chain not just fills in as verification of the succession of occasions saw, however evidence that it came from the biggest pool of computer chip power. Up to a greater part of computer processor power is constrained by hubs that are not collaborating to go after the organization, they'll create the longest chain and outperform aggressors. The actual organization requires insignificant design. Messages are communicated on a best exertion premise, and hubs can leave and rejoin the organization voluntarily, tolerating the longest confirmation of-work chain as verification of what occurred while they were no more.

 

Full Text:

PDF

References


W. Dai, "b-money," http://www.weidai.com/bmoney.txt, 1998.

H. Massias, X.S. Avila, and J.-J. Quisquater, "Design of a secure timestamping service with minimal trust requirements," In 20th Symposium on Information Theory in the Benelux, May 1999.

S. Haber, W.S. Stornetta, "How to time-stamp a digital document," In Journal of Cryptology, vol 3, no 2, pages 99-111, 1991.

D. Bayer, S. Haber, W.S. Stornetta, "Improving the efficiency and reliability of digital time-stamping," In Sequences II: Methods in Communication, Security and Computer Science, pages 329-334, 1993.

S. Haber, W.S. Stornetta, "Secure names for bit-strings," In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 28-35, April 1997.

A. Back, "Hashcash - a denial of service counter-measure," http://www.hashcash.org/papers/hashcash.pdf, 2002.

R.C. Merkle, "Protocols for public key cryptosystems," In Proc. 1980 Symposium on Security and Privacy, IEEE Computer Society, pages 122-133, April 1980.

W. Feller, "An introduction to probability theory and its application


Refbacks

  • There are currently no refbacks.