[Download postscript version]
next up previous contents
Next: User-friendly Up: Mandatory Properties Previous: Mandatory Properties

Security

Alice should be able to pass digital cash to Bob without that either of them, or others, can alter or reproduce the electronic token. The transaction protocol must ensure that a high-level security is maintained through sophisticated encryption techniques. The communication can be made secure using private key encryption, whereas the authentication of sender and receiver can be accomplished using digital signatures. Online verification can prevent double-spending, or other off-line techniques must be used.



Adrian Perrig
Fri May 31 09:07:38 MET DST 1996