Abstract
Physical cash is vulnerable to rising threats, such as large-scale, government-mandated forgeries, that digital cash may protect against more effectively. We study mechanisms to combine physical cash with digital cash to remove their respective shortcomings and obtain their combined advantages. We discuss initial mechanisms and examine their cost and benefit trade-offs.
An extended version of this paper is available [1]
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acquisti, A., Christin, N., Parno, B., Perrig, A.: Countermeasures against government-scale monetary forgery. CyLab TR-07-016, Carnegie Mellon University (December 2007)
Bellare, M., Miner, S.: A forward-secure digital signature scheme. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666. Springer, Heidelberg (1999)
Hoshino, H., Takeuchi, I., Yoda, M., Komiya, M., Sugahara, T.: Object to be checked for authenticity and a method for manufacturing the same, US Patent nr. 5,601,931 (February 1997)
Itkin, S., Martell, J.: A PDF417 primer: a guide to understanding second generation bar codes and portable data files. Technical Report Monograph 8, Symbol Tech. (April 1992)
Kügler, D.: On the anonymity of banknotes. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 108–120. Springer, Heidelberg (2005)
Mihm, S.: No Ordinary Counterfeit. New York Times Magazine (July 23, 2006)
Simmons, G.J.: Identification of data, devices, documents and individuals. In: Proc. IEEE CCST 1991, pp. 197–218, Taipei, Taiwan, ROC (October 1991)
Yoshida, J.: Euro bank notes to embed RFID chips by 2005. EE Times (December 2001), http://www.eetimes.com/story/OEG20011219S0016
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Acquisti, A., Christin, N., Parno, B., Perrig, A. (2008). Countermeasures against Government-Scale Monetary Forgery. In: Tsudik, G. (eds) Financial Cryptography and Data Security. FC 2008. Lecture Notes in Computer Science, vol 5143. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85230-8_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-85230-8_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-85229-2
Online ISBN: 978-3-540-85230-8
eBook Packages: Computer ScienceComputer Science (R0)