Professional Documents
Culture Documents
Icac 1604184 PDF
Icac 1604184 PDF
College of Computing Sciences and Information Technology (CCSIT) ,Teerthanker Mahaveer University , Moradabad
[2016]
ISBN-978-93-5288-834-3
202
International Conference on Advanced Computing (ICAC-2016)
College of Computing Sciences and Information Technology (CCSIT) ,Teerthanker Mahaveer University , Moradabad
[2016]
ISBN-978-93-5288-834-3
203
International Conference on Advanced Computing (ICAC-2016)
College of Computing Sciences and Information Technology (CCSIT) ,Teerthanker Mahaveer University , Moradabad
[2016]
ISBN-978-93-5288-834-3
204
International Conference on Advanced Computing (ICAC-2016)
College of Computing Sciences and Information Technology (CCSIT) ,Teerthanker Mahaveer University , Moradabad
[2016]
ISBN-978-93-5288-834-3
currency) encoded with the bank’s private VISA to serve as a clearinghouse for many
key. credit card issuing banks.
• If decoding by a customer yields a • And finally, consumers use the e-cash
recognizable message;” the customer can be software on the computer to generate a
fairly confident that only the bank could random number, which serves as the “note.”
have encoded it. • In exchange for money debited from the
• These digital signatures are as secure as the customer’s account, the bank uses its private
mathematics involved and have proved over key to digitally sign the note for the amount
.the past two decades to be more resistant to requested and transmits the note back to the
forgery than handwritten signatures. customer.
• Before e-cash can be used to buy products or • The network currency server, in effect, is
ser-vices, it must be procured from a issuing a “bank note,” with a serial
• Number and a dollar amount.
• Currency server.
• By digitally signing it, the bank is
PURCHASING E-CASH FROM CURRENCY
SERVERS committing itself to back that note with its
• The purchase of e cash from an on-line face value in real dollars.
currency server (or bank) involves • This method of note generation is very
• two steps (1) Establishment of an account secure, as neither the customer (payer) nor
and (2) Maintaining enough money in the the merchant (payee) can counterfeit the
• Account to back the purchase. bank’s digital signature (analogous to the
• Some customers might prefer to purchase e- watermark in paper currency).
cash with paper currency, either to maintain • Payer and payee can verify that the payment
anonymity or because they don’t have a is valid, since each knows the bank’s public
bank account. key.
• Currently, in most e-cash trials all customers • The bank is protected against forgery, the
must have an account with a central on-line payee against the bank’s refusal to honor a
bank. legitimate note, and the user against false
• This is overly restrictive for international accusations and invasion of privacy.
use and multi-currency transactions, for
customers should be able to access and pay VII. DIGIT-CASH (E-CASH)
for foreign services as well as local • Digital forms of value storage or value
• Services. exchange that have limited convertibility
• To support this access, e-cash must be into other forms of value and require
available in multiple currencies backed by intermediaries to convert
several banks. • In the case of Digi-Cash, every person using
• A service provider in one country could then e-cash has an e-cash account at a digital
accept tokens of various currencies from bank (First Digital Bank) on the Internet.
users in many different countries, redeem • Using that account, people can withdraw
them with their issuers, and have the funds and deposit e-cash.
transferred back to banks in the local • When an e-cash withdrawal is made, the PC
country. of the e-cash user calculates how many
• A possible solution is to use an association digital coins of what denominations are
of digital banks similar to organizations like needed to withdraw the requested amount.
205
International Conference on Advanced Computing (ICAC-2016)
College of Computing Sciences and Information Technology (CCSIT) ,Teerthanker Mahaveer University , Moradabad
[2016]
ISBN-978-93-5288-834-3
• Next, random serial numbers for those coins • Even the bank can’t connect the signing with
will be generated and the blinding (random the payment, since the customer’s original
number) factor will be included. note number was blinded when it was signed.
• The result of these calculations will be sent • In other words, it is a way of creating
to the digital bank. anonymous, untraceable currency. What
• The bank will encode the blinded numbers makes it even more interesting is that users
with its secret key (digital signature) and at can prove unequivocally that they did or did
the same time debit the account of the client not make a particular payment.
for the same amount. • This allows the bank to sign the “note”
• The authenticated coins are sent back to the without ever actually knowing how the
user and finally the user will take out the issued currency will be used.
blinding factor that he or she introduced • For those readers who are mathematically
earlier. inclined, the protocol behind blind
• The serial numbers-plus their signatures are signatures is presented.
now digital coins; their value is guaranteed
by the bank. VIII. CONCLUSIONS
• Electronic cash can be completely E-Cash Systems are found to be more efficient,
anonymous. Anonymity allows freedom of which leads have lower prices and lower
usage to buy illegal products such as drugs transaction costs; anybody can use it, as like
or pornographic material or to buy legal credit cards, and does not require special
product and services. authorization. It enhances efficiency in
• This is accomplished in the following Transactions. Internet transfer of cash is cheap
manner. When the e-cash software generates with compare transactions made using credit
a note, it masks the original number or cards. It can be also be inferred that non-existent
“blinds” the note using a random number of tax trail, in case of money laundering and
and transmits it to a bank. suspicious forgery accounts.
• The “blinding” carried out by the customer’s
software makes it impossible for anyone to
link payment to payer.
206