Offline Digital Euro: a Minimum Viable CBDC using Groth-Sahai proofs
- URL: http://arxiv.org/abs/2407.13776v1
- Date: Mon, 1 Jul 2024 09:55:14 GMT
- Title: Offline Digital Euro: a Minimum Viable CBDC using Groth-Sahai proofs
- Authors: Leon Kempen, Johan Pouwelse,
- Abstract summary: Current digital payment solutions are fragile and offer less privacy than traditional cash.
No transaction can be executed during server malfunctions or power outages.
This thesis proposes a design and a first implementation for an offline-first digital euro.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Current digital payment solutions are fragile and offer less privacy than traditional cash. Their critical dependency on an online service used to perform and validate transactions makes them void if this service is unreachable. Moreover, no transaction can be executed during server malfunctions or power outages. Due to climate change, the likelihood of extreme weather increases. As extreme weather is a major cause of power outages, the frequency of power outages is expected to increase. The lack of privacy is an inherent result of their account-based design or the use of a public ledger. The critical dependency and lack of privacy can be resolved with a Central Bank Digital Currency that can be used offline. This thesis proposes a design and a first implementation for an offline-first digital euro. The protocol offers complete privacy during transactions using zero-knowledge proofs. Furthermore, transactions can be executed offline without third parties and retroactive double-spending detection is facilitated. To protect the users' privacy, but also guard against money laundering, we have added the following privacy-guarding mechanism. The bank and trusted third parties for law enforcement must collaborate to decrypt transactions, revealing the digital pseudonym used in the transaction. Importantly, the transaction can be decrypted without decrypting prior transactions attached to the digital euro. The protocol has a working initial implementation showcasing its usability and demonstrating functionality.
Related papers
- Collaborative Inference over Wireless Channels with Feature Differential Privacy [57.68286389879283]
Collaborative inference among multiple wireless edge devices has the potential to significantly enhance Artificial Intelligence (AI) applications.
transmitting extracted features poses a significant privacy risk, as sensitive personal data can be exposed during the process.
We propose a novel privacy-preserving collaborative inference mechanism, wherein each edge device in the network secures the privacy of extracted features before transmitting them to a central server for inference.
arXiv Detail & Related papers (2024-10-25T18:11:02Z) - PayOff: A Regulated Central Bank Digital Currency with Private Offline Payments [13.78379361552975]
The European Central Bank is preparing for the potential issuance of a central bank digital currency (CBDC), called the digital euro.
offline payments are expected to enable cash-like privacy, local payment settlement, and the enforcement of holding limits.
This paper presents PayOff, a novel CBDC design motivated by the digital euro regulation, which focuses on offline payments.
arXiv Detail & Related papers (2024-08-13T15:15:06Z) - Conceptual Design and Implementation of FIDO2 compatible Smart Card for Decentralized Financial Transaction System [0.2678472239880052]
Existing passwordless and password-based peer to peer transactions in online banking systems are vulnerable to advanced forms of digital attacks.
This paper proposes a novel and robust peer to peer transaction system which employs best cloud security practices, proper use of cryptography and trusted computing to mitigate common vulnerabilities.
arXiv Detail & Related papers (2024-08-09T10:08:10Z) - Protecting User Privacy in Online Settings via Supervised Learning [69.38374877559423]
We design an intelligent approach to online privacy protection that leverages supervised learning.
By detecting and blocking data collection that might infringe on a user's privacy, we can restore a degree of digital privacy to the user.
arXiv Detail & Related papers (2023-04-06T05:20:16Z) - Cryptocurrency wallets: assessment and security [22.2119274519877]
Hot and cold digital wallets are considered as two types of this wallet.
Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group.
arXiv Detail & Related papers (2023-03-06T08:52:01Z) - THE-X: Privacy-Preserving Transformer Inference with Homomorphic
Encryption [112.02441503951297]
Privacy-preserving inference of transformer models is on the demand of cloud service users.
We introduce $textitTHE-X$, an approximation approach for transformers, which enables privacy-preserving inference of pre-trained models.
arXiv Detail & Related papers (2022-06-01T03:49:18Z) - FIRST: FrontrunnIng Resilient Smart ConTracts [3.5061201620029876]
In some cases, the inherently transparent and unregulated nature of cryptocurrencies leads to verifiable attacks on users of these applications.
One such attack is frontrunning, where a malicious entity leverages the knowledge of currently unprocessed financial transactions.
We propose FIRST, a framework that prevents frontrunning attacks and is built using cryptographic protocols.
arXiv Detail & Related papers (2022-04-02T23:30:13Z) - A Digital Currency Architecture for Privacy and Owner-Custodianship [0.0]
We propose an approach to digital currency that would allow people without banking relationships to transact electronically and privately.
Our proposal introduces a government-backed, privately-operated digital currency infrastructure.
We argue that our system can restore and preserve the salient features of cash, including privacy, owner-custodianship, fungibility, and accessibility.
arXiv Detail & Related papers (2021-01-13T18:44:10Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - BeeTrace: A Unified Platform for Secure Contact Tracing that Breaks Data
Silos [73.84437456144994]
Contact tracing is an important method to control the spread of an infectious disease such as COVID-19.
Current solutions do not utilize the huge volume of data stored in business databases and individual digital devices.
We propose BeeTrace, a unified platform that breaks data silos and deploys state-of-the-art cryptographic protocols to guarantee privacy goals.
arXiv Detail & Related papers (2020-07-05T10:33:45Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.