Assume that, in the anonymous electronic cash protocol, the bank is honest but the customer and the merchant might not be.

a. After receiving the tokens from the bank, the customer later claims that she never received them. Explain what the bank should then do and why it is correct.
b. After receiving the message containing the purchase order and the tokens from the customer, the merchant claims never to have received the message. Explain what the customer should do and why.


a. The bank sends the customer another copy of the tokens. Even if the customer is dishonest and did receive the tokens the first time, she cannot spend the same tokens twice.
b. Resend the message. The merchant cannot deposit the tokens twice.

Computer Science & Information Technology

You might also like to view...

The view used to present information to an audience is ________ view

Fill in the blank(s) with correct word

Computer Science & Information Technology

Sometimes called ________, nonprinting characters are not displayed on the screen by default

A) formatting marks B) paragraph formatting C) views D) PDFs

Computer Science & Information Technology

How can you confirm what ink separations will print?

What will be an ideal response?

Computer Science & Information Technology

The ____ package contains is implicitly imported into Java programs and is the only automatically imported, named package.

A. javax.swing B. java.lang C. JOptionPane D. System

Computer Science & Information Technology