Certified Hardware Requirements Undermine Digital Currency
- URL: http://arxiv.org/abs/2209.12076v2
- Date: Wed, 28 Sep 2022 14:17:05 GMT
- Title: Certified Hardware Requirements Undermine Digital Currency
- Authors: Geoffrey Goodell
- Abstract summary: This article critically assesses the problems that digital currency solutions are being proposed to solve.
We examine the characteristics of trusted computing within the context of its application to digital currency systems.
We conclude that the interests of consumers would be better served by design approaches to digital currency that do not require the use of trusted hardware.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Design approaches based on certified hardware have featured prominently in
the recent debate concerning the deployment of large-scale digital currency
systems in general and systems to support central bank digital currency (CBDC)
in particular. Certified hardware is a cornerstone of the so-called "trusted
computing" paradigm, wherein a user carries a device designed to operate in a
manner that respects the will of a third party in preference to the will of the
user. The justification for such approaches is usually given in terms of the
perceived need to facilitate offline payments or to facilitate the recovery of
lost assets. In this article, we critically assess the essential problems that
digital currency solutions are being proposed to solve, particularly with
respect to the future of payments and the future of cash. Next, we examine the
characteristics of trusted computing within the context of its application to
digital currency systems and its potential impact on the power relationships
between the users of devices, the manufacturers of devices, and other powerful
actors such as corporations and the state. Finally, we assess the validity of
common justifications for certified hardware in the context of alternative
designs, limitations, and trade-offs. We conclude that the interests of
consumers would be better served by design approaches to digital currency that
do not require the use of trusted hardware.
Related papers
- Payments Use Cases and Design Options for Interoperability and Funds Locking across Digital Pounds and Commercial Bank Money [0.0]
We focus on three key capabilities: communication between digital pound ecosystem participants, funds locking, and interoperability across digital pounds and commercial bank money.
We conclude that a financial market infrastructure (FMI) providing specific capabilities could simplify the experience of ecosystem participants, simplify the operating platforms for both the Bank of England and digital pound Payment Interface Providers (PIPs) and facilitate the creation of innovative services.
arXiv Detail & Related papers (2024-09-13T09:12:32Z) - SPOQchain: Platform for Secure, Scalable, and Privacy-Preserving Supply Chain Tracing and Counterfeit Protection [46.68279506084277]
This work proposes SPOQchain, a novel blockchain-based platform that provides comprehensive traceability and originality verification.
It provides an analysis of privacy and security aspects, demonstrating the need and qualification of SPOQchain for the future of supply chain tracing.
arXiv Detail & Related papers (2024-08-30T07:15:43Z) - Towards Credential-based Device Registration in DApps for DePINs with ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv Detail & Related papers (2024-06-27T09:50:10Z) - Multi-Tier Computing-Enabled Digital Twin in 6G Networks [50.236861239246835]
In Industry 4.0, industries such as manufacturing, automotive, and healthcare are rapidly adopting DT-based development.
The main challenges to date have been the high demands on communication and computing resources, as well as privacy and security concerns.
To achieve low latency and high security services in the emerging DT, multi-tier computing has been proposed by combining edge/fog computing and cloud computing.
arXiv Detail & Related papers (2023-12-28T13:02:53Z) - Functional Consistency across Retail Central Bank Digital Currency and
Commercial Bank Money [0.0]
We focus on a potential UK retail CBDC, the 'digital pound', and the Bank of England's 'platform model'
We identify the common operational characteristics that are required to achieve functional consistency across all forms of regulated retail digital money.
We conclude that no single design option could provide functional consistency across digital pounds and commercial bank money.
arXiv Detail & Related papers (2023-08-16T13:38:56Z) - The Future of Consumer Edge-AI Computing [58.445652425379855]
Deep Learning has rapidly infiltrated the consumer end, mainly thanks to hardware acceleration across devices.
As we look towards the future, it is evident that isolated hardware will be insufficient.
We introduce a novel paradigm centered around EdgeAI-Hub devices, designed to reorganise and optimise compute resources and data access at the consumer edge.
arXiv Detail & Related papers (2022-10-19T12:41:47Z) - A Scalable Architecture for Electronic Payments [0.0]
We present a scalable architecture for electronic retail payments via central bank digital currency.
We offer a solution to the perceived conflict between robust regulatory oversight and consumer affordances such as privacy and control.
arXiv Detail & Related papers (2021-10-26T16:38:45Z) - Decentralizing Supply Chain Anti-Counterfeiting Systems Using Blockchain
Technology [0.0]
This research proposes the Decentralized NFC-Enabled Anti-Counterfeiting System (dNAS)
dNAS is proposed and developed to facilitate trustworthy data retrieval, verification and management.
It provides a secure and immutable scientific data tracking and management platform on which provenance records are validated.
arXiv Detail & Related papers (2021-02-02T12:17:10Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.