From: Hal <hfinney@shell.portal.com>
To: cypherpunks@toad.com
Message Hash: 00650a54043e9bc6957334d6856335173945f501740eefa5f033a675e472452e
Message ID: <199604101433.HAA16637@jobe.shell.portal.com>
Reply To: N/A
UTC Datetime: 1996-04-10 21:31:41 UTC
Raw Date: Thu, 11 Apr 1996 05:31:41 +0800
From: Hal <hfinney@shell.portal.com>
Date: Thu, 11 Apr 1996 05:31:41 +0800
To: cypherpunks@toad.com
Subject: Re: Tense visions of future imperfect
Message-ID: <199604101433.HAA16637@jobe.shell.portal.com>
MIME-Version: 1.0
Content-Type: text/plain
From: frantz@netcom.com (Bill Frantz)
> >[Description of dcash counterfeiting scam, presumably done by stealing
> > the bank's public key]
> I don't see how this third scam would work in a system such as DigiCash
> which uses online clearing. Unissued serial numbers would be refused when
> presented for clearing.
DigiCash banks do not issue serial numbers. Serial numbers are randomly
chosen by the user when he withdraws his cash. He blinds the serial
number before presenting the cash to be signed by the bank during
withdrawal. So the bank never sees serial numbers until they are spent.
The uniqueness of serial numbers results solely from having a large
enough random space that matches are unlikely.
What the bank does is keep a list of all spent serial numbers, not all
issued ones (since it doesn't know those). That way it can detect double
spending.
We have had some discussions here about how banks could recognize this
kind of counterfeiting, similar to the statistical measures mentioned in
Garfinkel's scenario, and steps that could be taken.
Hal
Return to April 1996
Return to “Hal <hfinney@shell.portal.com>”
1996-04-10 (Thu, 11 Apr 1996 05:31:41 +0800) - Re: Tense visions of future imperfect - Hal <hfinney@shell.portal.com>