نتایج جستجو برای: spending

تعداد نتایج: 16337  

Journal: :IACR Cryptology ePrint Archive 2014
Gideon Samid

The basic idea is to excise the bitcoin money generation formula, and otherwise apply bitcoin essentially “as is” over digital coins which are redeemable by the mint that minted them. This will preserve the bitcoin assured anonymity. The new bitcoin.BitMint solution will benefit from bitcoin’s double-spending prevention, and would otherwise enjoy all the benefits associated with money in a digi...

Journal: :Electronic Markets 1993
Gennady Medvinsky B. Clifford Neuman

Security: Forging paper currency is difficult. Unfortunately, electronic currency is just data and is easily copied. Copying or double spending of electronic currency should be prevented or detected. Ideally the illegal creation, copying, and reuse of electronic cash should be unconditionally or computationally impossible. Some systems rely instead on post-fact detection and punishment of doubl...

2007
Larry Shi Bogdan Carbunar Radu Sion

We introduce a novel conditional e-cash protocol allowing future anonymous cashing of bank-issued e-money only upon the satisfaction of an agreed-upon public condition. Payers are able to remunerate payees for services that depend on future, yet to be determined outcomes of events. Once payment complete, any double-spending attempt by the payer will reveal its identity; no double-spending by th...

Journal: :CoRR 2017
Cyril Grunspan Ricardo Pérez-Marco

We correct the double spend race analysis given in Nakamoto’s foundational Bitcoin article and give a closed-form formula for the probability of success of a double spend attack using the Regularized Incomplete Beta Function. We give the first proof of the exponential decay on the number of confirmations and find an asymptotic formula. Larger number of confirmations are necessary compared to th...

2007
Jaap-Henk Hoepman

We study the problem of preventing double spending in electronic payment schemes in a distributed fashion. This problem occurs, for instance, when the spending of electronic coins needs to be controlled by a large collection of nodes (e.g., in a peer-to-peer (P2P) system) instead of one central bank. Contrary to the commonly held belief that this is fundamentally impossible, we propose several ...

1999
Chintan Shah Rei Safavi-Naini

Micropayment systems are electronic payment systems that are used for very small payment and for their viability must have small transaction cost. In this paper we propose a coin-based micropayment scheme that uses a probabilistic fraud checking with distributed verification to provide an efficient solution to detect double spending by malicious customers and hence reduces the risk on the merch...

2003
Josep Lluís Ferrer-Gomila Magdalena Payeras-Capellà Llorenç Huguet i Rotger

In this paper we present a fully anonymous (for payer and payee) electronic payment scheme for B2B transactions involving high amounts, without using tamper resistant devices, without pseudonyms, and preventing double spending. Schemes with detection of double spending at deposit are not well suited for high amount transactions (merchants and banks don’t want to assume potential high losses). O...

2007
Chittaranjan A. Mandal Chris Reade

A new scheme for electronic money is described where e-cash is created for a specific recipient in any transaction. This has benefits for the efficiency of implementing measures against double spending. Details of the scheme are provided to show that anonymity and transferability are still possible with recipient specific e-cash. The scheme ensures both authentication and integrity of the elect...

Journal: :CoRR 2017
Cyril Grunspan Ricardo Pérez-Marco

We present Bitcoin Security Tables computing the probability of success p(z, q, t) of a double spend attack by an attacker controlling a share q of the hashrate after z confirmations in time t.

1996
Agnes Hui Chan Yair Frankel Philip D. MacKenzie Yiannis Tsiounis

In Crypto '93, S. Brands presented a very eecient oo-line electronic cash scheme based on the representation problem in groups of prime order. In Crypto '95 a very eecient oo-line divisible e-cash scheme based on factoring Williams integers was presented by T. Okamoto. We demonstrate one eecient attack on Okamoto's scheme and two on Brands' scheme which allow users to misrepresent their identit...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید