E-CASH ANONYMOUS ELECTRONIC PAYMENTS
#1

Abstract

This is paper presents a complete view on working of payment transaction by E-cash. Cryptography used in this process finds the double spending and forgery of E-cash which is nothing but digital information. The digital information specified as E-cash contains the identity of buyer. Bank maintains all information involved in E-cash notes for every user.

The process of transaction involves three participants i.e, bank (who signs E-cash notes),buyer (who uses E-cash),seller(who deposits the notes). The cryptography techniques used in E-cash payment system is digital signature. After signing by bank only cash will valid for payment. Both seller and buyer equipped with public key of bank.

Before each and every transaction a secured connection established between every two participants by symmetric cryptography (common secret key). Thus the system achieves payment process without any third party involvement. And also E-cash notes work like conventional money (coins and notes) because a seller can verify the validity of E-cash notes. The main concept used in each note is RIS (random identity string).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: electronic cash register project, survey on smartcard and mobile payments pdf, electronic cash controller miniproject, electronic cash register using 8051 ppt, material on payments domain banking, cash management project sbi, anonymous publication of sensitive transaction data architecture diagram,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Seminar on Nymble: Anonymous IP-Address Blocking computer girl 1 1,471 08-02-2013, 11:49 AM
Last Post: Guest
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,158 09-06-2012, 06:01 PM
Last Post: computer girl
  Confidential Storage and Deletion methods for Electronic Media computer girl 0 844 07-06-2012, 10:34 AM
Last Post: computer girl
  Electronic Nose (Download Full Seminar Report) Computer Science Clay 17 15,380 02-03-2012, 03:57 PM
Last Post: ratanlal
  Electronic Paper Display summer project pal 2 2,115 14-02-2012, 10:38 AM
Last Post: seminar paper
Shocked Electronic paper (E-paper) Computer Science Clay 19 15,512 14-02-2012, 10:38 AM
Last Post: seminar paper
  Watermarking Medical Images with Anonymous Patient Identification to VerifyAuthentic seminar class 0 1,235 11-04-2011, 10:30 AM
Last Post: seminar class
  IMPLEMENTATION OF ENHANCED ANONYMOUS ROUTING FOR WIRELESS BROADCAST NETWORKS seminar class 0 799 22-03-2011, 02:30 PM
Last Post: seminar class
  coffee analysis with an electronic nose electronics seminars 2 4,204 22-02-2011, 02:58 PM
Last Post: seminar class
  Recoverable and Untraceable E-Cash seminar surveyer 1 1,441 14-10-2010, 05:17 PM
Last Post: singhpaulamit

Forum Jump: