E-CASH ANONYMOUS ELECTRONIC PAYMENTS
#1

Abstract

This is paper presents a complete view on working of payment transaction by E-cash. Cryptography used in this process finds the double spending and forgery of E-cash which is nothing but digital information. The digital information specified as E-cash contains the identity of buyer. Bank maintains all information involved in E-cash notes for every user.

The process of transaction involves three participants i.e, bank (who signs E-cash notes),buyer (who uses E-cash),seller(who deposits the notes). The cryptography techniques used in E-cash payment system is digital signature. After signing by bank only cash will valid for payment. Both seller and buyer equipped with public key of bank.

Before each and every transaction a secured connection established between every two participants by symmetric cryptography (common secret key). Thus the system achieves payment process without any third party involvement. And also E-cash notes work like conventional money (coins and notes) because a seller can verify the validity of E-cash notes. The main concept used in each note is RIS (random identity string).
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: discover cash back, what is project free cash, anonymous publication of sensitive transaction data 2nd review meterials, interview questions on payments, cash management project, payments domain ppt, cash management mba projects,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Seminar on Nymble: Anonymous IP-Address Blocking computer girl 1 1,466 08-02-2013, 11:49 AM
Last Post: Guest
  Intelligent Electronic Devices (IEDs) and Supervisory Control and Data Acquisition computer girl 0 1,148 09-06-2012, 06:01 PM
Last Post: computer girl
  Confidential Storage and Deletion methods for Electronic Media computer girl 0 837 07-06-2012, 10:34 AM
Last Post: computer girl
  Electronic Nose (Download Full Seminar Report) Computer Science Clay 17 15,348 02-03-2012, 03:57 PM
Last Post: ratanlal
  Electronic Paper Display summer project pal 2 2,106 14-02-2012, 10:38 AM
Last Post: seminar paper
Shocked Electronic paper (E-paper) Computer Science Clay 19 15,403 14-02-2012, 10:38 AM
Last Post: seminar paper
  Watermarking Medical Images with Anonymous Patient Identification to VerifyAuthentic seminar class 0 1,226 11-04-2011, 10:30 AM
Last Post: seminar class
  IMPLEMENTATION OF ENHANCED ANONYMOUS ROUTING FOR WIRELESS BROADCAST NETWORKS seminar class 0 794 22-03-2011, 02:30 PM
Last Post: seminar class
  coffee analysis with an electronic nose electronics seminars 2 4,204 22-02-2011, 02:58 PM
Last Post: seminar class
  Recoverable and Untraceable E-Cash seminar surveyer 1 1,421 14-10-2010, 05:17 PM
Last Post: singhpaulamit

Forum Jump: