Skip to main content

A platform for privately defined currencies, loyalty credits, and play money

  • Conference paper
  • First Online:
Financial Cryptography (FC 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1465))

Included in the following conference series:

Abstract

We use techniques from financial cryptography to define new electronic currencies that are suitable for many applications. We use a platform approach to allow a single, world-wide infrastructure to support a practically unlimited number of new currencies. The platform permits new currencies to be defined with little effort, and allows an individual to effectively manage and use perhaps a few dozen of those currencies that he finds personally useful. We describe the structures and mechanisms of the platform, various applications, and the risks associated with its use.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.C. Merkle, “A certified Digital Signature”, Advances in Cryptology, Crypto '89 Proceedings, LNCS# 435, G. Brassard (Ed.), Springer, NY, 1990, p. 218.

    Google Scholar 

  2. G.J. Simmons, “A survey of Information Authentication”, Chapter 7 of Contemporary Cryptology, Edited by G.J. Simmons, IEEE Press, New York, 1992.

    Google Scholar 

  3. CEN standard 1546-2, “Identification Card Systems — Inter-sector electronic purse Part 2: Security Architecture ”, European Committee for Standardization, Central Secretariat: rue de Stassart 36, B-1050 Brussels, 1995.

    Google Scholar 

  4. D. P. Maher, “Crypto Backup and Key Escrow”, CACM, March 1996.

    Google Scholar 

  5. M. K. Reiter, “Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart”. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68–80, November 1994.

    Google Scholar 

  6. D. P. Maher, “Fault Induction Attacks, Tamper Resistance, and Hostile Reverse Engineering in Perspective”, Proceedings of the 1997 Financial Cryptography Conference, LNCS# 1318, R. Hirschfeld (Ed.), Springer, New York, 1997.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirchfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Maher, D.P. (1998). A platform for privately defined currencies, loyalty credits, and play money. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055472

Download citation

  • DOI: https://doi.org/10.1007/BFb0055472

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64951-9

  • Online ISBN: 978-3-540-53918-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics