Sending Money Like Sending E-mails: Cryptoaddresses, The Universal Decentralised Identities
نویسنده
چکیده
Sending money in cryptocurrencies is majorly based on public keys or their hashed forms—“addresses.” These long random-looking strings are user unfriendly for transferring by other means than via copyand-paste or QR codes. Replacing such strings with identifiers chosen by users themselves would significantly improve usability of cryptocurrencies. Such identifiers could be memorable, easier to write on paper or to dictate over phone. Main challenge lies in designing a practically usable decentralised system for providing these identifiers. Former solutions have been built as centralised systems or come with nonnegligible limitations. Our solution is reminiscent of a prevalent e-mail system, which is an already user friendly and desirably decentralised system. It is shown that our approach is directly applicable also to other systems that use long cryptographic identifiers.
منابع مشابه
The Minimum Universal Cost Flow in an Infeasible Flow Network
In this paper the concept of the Minimum Universal Cost Flow (MUCF) for an infeasible flow network is introduced. A new mathematical model in which the objective function includes the total costs of changing arc capacities and sending flow is built and analyzed. A polynomial time algorithm is presented to find the MUCF.
متن کاملEfficacy of Different Reminders to Reduce Missed Orthodontic Appointments
Objectives: Since forgetfulness is the major cause of missed appointments, reminder systems can be used prior to appointments. The present study aimed to evaluate the efficacy of different reminders [e-mails, social networks, telephone, and short message service (SMS)] in order to reduce missed appointments by orthodontic patients. Methods: Of a total of 751 active orthodontic patients, 379 we...
متن کاملAn Efficient Two-phase Spam Filtering Method Based on E-mails Categorization
The e-mail’s header session usually contains important attributes such as e-mail title, sender’s name, sender’s email address, sending date, which are helpful to classification of e-mails. In this paper, we apply decision tree data mining technique to header’s basic attributes to analyze the association rules of spam e-mails and propose an efficient spam filtering method to accurately identify ...
متن کامل"A Bank Would Never Write That!" A Qualitative Study on E-Mail Trust Decisions
In order to communicate the risk of fraudulent e-mails to users properly, it is important to know which aspects they focus on when evaluating the trustworthiness of an e-mail. To that end, a study was conducted to test predictions derived from a decision model by asking participants how they would react to each of eight e-mails and why. The study confirms results from previous research showing ...
متن کاملAccuracy Analysis of Neural Networks in Removal of Unsolicited e-mails
Today communication has been revolutionized with email and other online communication systems. However, some computer users have abused the technology used to drive these communications, by sending out thousands and thousands of spam emails with little or no purpose other than to increase traffic or decrease bandwidth. With the electronic mail emerging
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016