SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 4
Anonymous E-Cash Transaction is using Bitcoin
Sanket Subhash Mane
Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India
ABSTRACT
Crypto-currency is variety of digital and virtual currency on a technology is
understood as Blockchain. Bitcoin is understood as peer to peer payment
network. Bitcoin victimization payment dealing not needed central authority
permission. Here all managing and validatory dealing anonymously payment
network system.
Bitcoin shows new ways that E-cash dealing system. E-cash send directly to
one user to second user. While not interrupted by the another user.Hereeven
have quicker and minimum fees to transfer e-cash. Exploitation Bitcoinall the
transaction cryptograpically secured. Bitcoin not provide very safe privacy
guarantees, payment communication are saved in a public decentralized
ledger.
KEYWORDS: Blockchain, Bitcoin, Anonymous, privacy
How to cite this paper: Sanket Subhash
Mane "Anonymous E-Cash Transaction is
using Bitcoin"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-3, April 2020, pp.4-7, URL:
www.ijtsrd.com/papers/ijtsrd30222.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
Blockchain produce chain of block. Blockchain it holds the hash value of previous block. It contains combination list ofdealing
data. it contain value of nonce and Hash. Hash is alphanumerical value. Using hash value identify a block.[6]
Fig. Two example blockchains. Chain(a)illustrates an ordinary Bitcoin exchange history, with every exchange connected to a
former exchange. Chain(b)illustrates a Zerocoin chain. The linkageamongmintandspend(spottedline) can'tberesolvedfrom
the square chain information.
Sotoshi Nakamoto shows bitcoin on 31 October 2008 in a paper. After all the currency is open for public Bitcoin is early
decentralized digital currency. Allows users to transfer E-cash peer to peer without an intermediate (banks, etc). User hasfull
management of its Bitcoin. Bitcoin used for purchases, E-commerce transactions, investments,paymentstoshopfor products.
It came into existence by person or group of people called satoshi nakamoto. Bitcoin helps to transferring assets is faster than
regular fiat currencies. It has lower transaction fees. It has cryptographically secured. It has entire transaction
cryptographically sign and sender and receiver also secure.
Bitcoin is that the most open financial set-up tothispoint. You’ll beableto create paymentswithBitcoins24/7 everywhere the
planet, even wherever there’s no banking industry. Bitcoin is onymous,andanyonewill openitsnotecasevia thenetwithnone
verification or credit history. It’s particularly useful in underbanked regions and third-world countries wherever most of the
people struggle to induce access to cash.
IJTSRD30222
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 5
You can pay Bitcoins within the same ways that you pay ancient digital cash– froma PC,anitinerantora positiveidentification.
Unlike order currencies, Bitcoins area unit deflationary, that means that their worth is ready to understand intentionally.
Bitcoin is that the most transportable quality ever-created and might be transferredthroughsatellitesorperhapsradiowaves.
Despite makes an attempt to change offline Bitcoin payments, use of the currency still mostly depends onwebaccessibility.As
Bitcoin continues to be in development, the group action speed and charges tend to vary betting on mining potency and
network congestion. Changing Bitcoins into act incurs fees that area unit usually pricey.Besides everything,there's anabsence
of security behind the dealings of Bitcoin. There’s no guarantee to shield your Bitcoins from human error (passwords), sure
technical bugs (hard Drive corrupt, Virus). Bitcoin users have full management of the financial operations. They keep safeand
private details, therefore there's no likelihood of taken MasterCard and visa numbers. But, All Over,Bitcoinstill isnotfullysafe
to process of how to bitcoin transaction used. Bitcoin transaction among peers[7]
Fig. Bitcoin transaction
Literature Review
“Decentralizing Privacy: Using Blockchain to Protect Personal Data” author is Guy Zyskin, Oz Nathan, Alex, research paper
Private records, and touchy records in popular, have to not be relied on in the arms of third-parties, where they are at risk of
assaults and misuse. the Blockchain knows the users because the proprietors in their private information. Organizations, in
turn, can focus on collect records without being overly worried approximately well securing and compartmentalizing
them.[2015]
“Bitcoin: A Peer-to-Peer Electronic Cash System” in this paperauthorSatoshiNakamotoresearchsay,We'veproposeda gadget
for electronic transactions without relying on believe. We started with The usual framework of cash made from digital
signatures. Here in research paper all network have their have proof of work to record a all customers history of transactions.
Here easy payment authentication. Combining and splitting values explained privacy which algorithm used how to work in
bitcoin this explain.[March 2009]
”Bitcoin is a popular peer-to-peer crypto-currency supplying vulnerable anonymity” author is Xiangxue Li and Yu Yu in
research paper shows some points to related anonymous like Bitcoin is a popular peer-to-peer crypto-currency supplying
vulnerable anonymity. Over the past few years, a big quantity of pioneering paintings focused on mixing transaction that a
collection of customers alternate their bitcoins to interrupt the links, but, none of them fulfill all requirements. In this paper,
protocol primarily based on the trick of cryptographically secure DKG. It offers stronger anonymity and is compatible with
Bitcoin architecture. Subsequently, we analyse the protocol in all respects. [December 2017]
“A Survey on Anonymity and Privacy in Bitcoin like Digital Cash Systems” author is Merve Can Kus Khalilov and Albert LeviIn
this paper shows the survey which analyses anonymity and privacy studies in Bitcoin-like E-cash systems. In this paper have
privacy and anonymity. On this category, author examined and suppliedtaxonomyfor 25studies,and extractedninestrategies
and five effects from these research. Cryptographic have some problems to task getting problem. Here also shows the
anonymity and privacy way to improve.[2018]
“Zerocash: Decentralized Anonymous Payments” author is BitcoinEli Ben-Sasson∗, Alessandro Chiesay, Christina Garmanz,
Matthew Green in this paper Zerocash providessuchanonymity,byusinghidingconsumer personal data,transactionamounts,
and account balances from Public view. Bitcoin’s scripting language with zk-SNARKsthatallowrapidverificationofexpressive
statements. [2014]
Research Methodology
Nameless manner without a name, Many Bitcoin offerings authentic id, linked profiles can be now not an anonymous with the
aid of a ramification of aspect channels that’s the cause of unlinkablility want. Unlinkability defines as very tough to connect
special addresses of the identical user, difficult to hyperlink exceptional transactions ofthesameconsumeranddifficulttolink
sender of a charge of its receipt. [smartlearn]
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 6
Right here bitcoin nameless communication network used Tor browser. Tor is nameless conversation network. anonymouse
use of sender and receiver communication is not connected. Tor utilized by regular users, Journalist, malware and other
unlawful manner. Tor is funded by way of U.S. Branch and others. Bitcoin is relaxed and namelessvirtual forex.Bitcoincan'tbe
easily tracked back to you and are quicker and safer opportunity to other donation strategies.
Here have Basecoin is similar to altcoin. Basecoin may be into zero coins and again breaks link among original and new
basecoin. Zerocash is untraceable e coins all the transaction is in the envelope. Ledger simply files life of transactions. No
person realize.
Bitcoin is depending on blockchain. Every Bitcoin block memorializes a fixed of transactions which are amassed from the
Bitcoin broadcast Network. Bitcoin used blockchain features. Here are the features is SHA-256 Encryption here all the
encryption is done by algorithm, Blockchain uses cryptographic keys to relaxed identities and hash function to make the
blockchain immutable public and personal key the usage of data switch and security the use of keys.
It uses SHA 256 stands for the number of bits it takes up in memory securing, hashing and algorithm. Hash value is unique.
Value return by hash function its called hash value its impossible to decode original message using hash itself. It doesn’t
disclose hash value. SHA 256 is one way function here reverse is not possible that’s make very secure. [3]
Fig. Hashcash example
Cryptography uses public and private key to encrypt and decrypt data. but private key is only user knows. So user is become
anonymous.[8]
Fig. Bitcoin transaction processing steps
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 7
Proof of work using get solution of problem and represent the decision. I2P using anonymous transaction is done. In zero
knowledge protocols, blending is accomplished in a couple of transactions, consequently hyperlinksbetweentransactionsare
incomplete. Secure At ease Multiparty Computation (SMC) allows a group of users. Users compute the cost of a publicfunction
the usage of their non-public Statistics, even as they maintain their inputs personal
Coutu is created the network of transactions approach. Transactions have input and output data have a amount V is show
authorised person. Here all the values is constructed using hash tree. All block have counter values this all increased until the
hash fulfils these necessities. The Bitcoin detail holds that this prize ought to be decreased each year, in the long run being
wiped out through and through. [6]
This is bitcoin transaction done through public and private key.
Future Enhancement –
Sometimes bitcoin public addresses shows their name and
addresses here identity reveal and your internet protocol
address also match. Bitcoin transaction is saved in public
ledger. Anyone access personal information, all those issues
create, which is why we use bitcoin mixture. Bitcoin mixture
is used to hide id. We used in paper Tor browser search and
transaction of currency to anonymous. This also we review
in papers. Here another one concept touseinresearchpaper
use logless vpn to study. All this havesubjecttostudyrelated
in bitcoin used. Here we also used always new transaction
address in blockchain to use study material.
Conclusion-
Here have transaction informationof bitcoinandbitcoin role
in our life. The paper discussed way used to anonymous. E-
cash should insure a user personal data from his network
when conducting financial transactions. customer view.
Here we have privacy protection. Here algorithm SHA 256
algorithm used. Cryptocurrencyusinghidesuserdata.All the
anonymous transaction used cryptocurrency.
References-
[1] Guy Zyskind MIT Media Lab and Oz Nathan Tel-Aviv
University Cambridge, Alex Sandy PentlandMITMedia
Lab Cambridge “Decentralizing Privacy: Using
Blockchain to Protect Personal Data”.
[2] Satoshi Nakamoto “Bitcoin: A Peer-to-Peer Electronic
Cash System” satoshin@gmx.com Available:
www.bitcoin.org/bitcoin.pdf
[3] Mere Can Kus Khalilov and Albert Levi “A Survey on
Anonymity and Privacy in Bitcoin like Digital Cash
Systems” 2018.
[4] Xiangxue Li and Yu Yu “Bitcoin is a popular peer-to-
peer crypto-currency supplying vulnerable
anonymity”. December 2017.
[5] Ben-Sasson, Alessandro Chiesay, Christina Garmanz,
Matthew Greenz, Ian Miersz, Eran Tromerx, Madars
Virzay “Zerocash: DecentralizedAnonymousPayments
from BitcoinEli Technion, eli@cs.technion.ac.i. 2014.
[6] Aviel D. Rubin, Matthew Green, Christina Garman, Ian
Miers,” Zerocoin: Anonymous Distributed E-Cashfrom
Bitcoin “.
[7] Raja Sreedharan, Rejikumar and Drishti Marwaha,
Singapore University of Technology and Design, Kochi,
Amrita Vishwa Vidyapeetham, India “A literature
review on Bitcoin Arunmozhi Manimuthu”.
[8] Mauro Conti, Sandeep Kumar E, Chhagan Lal, IEEE,
Sushmita Ruj, IEEE “A Survey on Security and Privacy
Issues of Bitcoin”.

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
Nikesh Mistry
 
Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015
Doug Callaway
 
Project: Bitcoin - Revolution in International Payment Processing
Project: Bitcoin - Revolution in International Payment ProcessingProject: Bitcoin - Revolution in International Payment Processing
Project: Bitcoin - Revolution in International Payment Processing
Dinesh Kumar
 

Was ist angesagt? (20)

Blockchain
BlockchainBlockchain
Blockchain
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Introduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSAIntroduction to Bitcoin and ECDSA
Introduction to Bitcoin and ECDSA
 
Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015Blockchain and the New Internet 25-May-2015
Blockchain and the New Internet 25-May-2015
 
Project: Bitcoin - Revolution in International Payment Processing
Project: Bitcoin - Revolution in International Payment ProcessingProject: Bitcoin - Revolution in International Payment Processing
Project: Bitcoin - Revolution in International Payment Processing
 
Blockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking IndustryBlockchain Essentials - Harnessing the Technology for Banking Industry
Blockchain Essentials - Harnessing the Technology for Banking Industry
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Landscape Report 2019
Blockchain Landscape Report 2019Blockchain Landscape Report 2019
Blockchain Landscape Report 2019
 
Bitcoin on Blockchain: Money 2.0
Bitcoin on Blockchain: Money 2.0Bitcoin on Blockchain: Money 2.0
Bitcoin on Blockchain: Money 2.0
 
Blockchain 2.0
Blockchain 2.0Blockchain 2.0
Blockchain 2.0
 
Cryptocurrencies - Part II | A Case Study of Bitcoin
Cryptocurrencies - Part II | A Case Study of BitcoinCryptocurrencies - Part II | A Case Study of Bitcoin
Cryptocurrencies - Part II | A Case Study of Bitcoin
 
Developing a Versatile Cryptocurrency Wallet
Developing a Versatile Cryptocurrency WalletDeveloping a Versatile Cryptocurrency Wallet
Developing a Versatile Cryptocurrency Wallet
 
Blockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.ioBlockchain 101 presentation by fstream.io
Blockchain 101 presentation by fstream.io
 
Blockchain and Bitcoin
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and Bitcoin
 
An Introduction to Blockchain
An Introduction to BlockchainAn Introduction to Blockchain
An Introduction to Blockchain
 
Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain Demysitifying Bitcoin and Blockchain
Demysitifying Bitcoin and Blockchain
 
BitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed ComputingBitCoin, P2P, Distributed Computing
BitCoin, P2P, Distributed Computing
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain
BlockchainBlockchain
Blockchain
 
Blockchain Introduction
Blockchain IntroductionBlockchain Introduction
Blockchain Introduction
 

Ähnlich wie Anonymous E Cash Transaction is using Bitcoin

IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
MuskanRath1
 
Crypto Currency
Crypto CurrencyCrypto Currency
Crypto Currency
MemoonaMurtaza
 

Ähnlich wie Anonymous E Cash Transaction is using Bitcoin (20)

IMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docxIMPACT OF BITCOIN ON 21st CENTURY.docx
IMPACT OF BITCOIN ON 21st CENTURY.docx
 
bitcoin technology report
bitcoin technology reportbitcoin technology report
bitcoin technology report
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)
 
Expanding Beyond Cryptocurrency in the Digital World using Blockchain Technology
Expanding Beyond Cryptocurrency in the Digital World using Blockchain TechnologyExpanding Beyond Cryptocurrency in the Digital World using Blockchain Technology
Expanding Beyond Cryptocurrency in the Digital World using Blockchain Technology
 
Bitcoin Cryptocurrency
Bitcoin CryptocurrencyBitcoin Cryptocurrency
Bitcoin Cryptocurrency
 
IRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking ApplicationIRJET- Block Chain based Banking Application
IRJET- Block Chain based Banking Application
 
Bitcoin.pg
Bitcoin.pgBitcoin.pg
Bitcoin.pg
 
Bitcoin a road ahead
Bitcoin a road aheadBitcoin a road ahead
Bitcoin a road ahead
 
Investors Guide to Crypto
Investors Guide to CryptoInvestors Guide to Crypto
Investors Guide to Crypto
 
BitCoin report
BitCoin reportBitCoin report
BitCoin report
 
Crypto currency - a digital asset
Crypto currency - a digital asset Crypto currency - a digital asset
Crypto currency - a digital asset
 
Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02Seminarreportonbitcoinapp02
Seminarreportonbitcoinapp02
 
How does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptxHow does the division of Bitcoins work_.pptx
How does the division of Bitcoins work_.pptx
 
BITCOIN GLOSSARY
BITCOIN GLOSSARYBITCOIN GLOSSARY
BITCOIN GLOSSARY
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdf
 
What Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdfWhat Are The Key Components Of Bitcoin.pdf
What Are The Key Components Of Bitcoin.pdf
 
IRJET- Blockchain Technology
IRJET- Blockchain TechnologyIRJET- Blockchain Technology
IRJET- Blockchain Technology
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Crypto Currency
Crypto CurrencyCrypto Currency
Crypto Currency
 
Blockchain Technology.pptx
Blockchain Technology.pptxBlockchain Technology.pptx
Blockchain Technology.pptx
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Anonymous E Cash Transaction is using Bitcoin

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 4 Anonymous E-Cash Transaction is using Bitcoin Sanket Subhash Mane Department of MCA, YMT College of Management, Kharghar, Navi Mumbai, Maharashtra, India ABSTRACT Crypto-currency is variety of digital and virtual currency on a technology is understood as Blockchain. Bitcoin is understood as peer to peer payment network. Bitcoin victimization payment dealing not needed central authority permission. Here all managing and validatory dealing anonymously payment network system. Bitcoin shows new ways that E-cash dealing system. E-cash send directly to one user to second user. While not interrupted by the another user.Hereeven have quicker and minimum fees to transfer e-cash. Exploitation Bitcoinall the transaction cryptograpically secured. Bitcoin not provide very safe privacy guarantees, payment communication are saved in a public decentralized ledger. KEYWORDS: Blockchain, Bitcoin, Anonymous, privacy How to cite this paper: Sanket Subhash Mane "Anonymous E-Cash Transaction is using Bitcoin" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.4-7, URL: www.ijtsrd.com/papers/ijtsrd30222.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION Blockchain produce chain of block. Blockchain it holds the hash value of previous block. It contains combination list ofdealing data. it contain value of nonce and Hash. Hash is alphanumerical value. Using hash value identify a block.[6] Fig. Two example blockchains. Chain(a)illustrates an ordinary Bitcoin exchange history, with every exchange connected to a former exchange. Chain(b)illustrates a Zerocoin chain. The linkageamongmintandspend(spottedline) can'tberesolvedfrom the square chain information. Sotoshi Nakamoto shows bitcoin on 31 October 2008 in a paper. After all the currency is open for public Bitcoin is early decentralized digital currency. Allows users to transfer E-cash peer to peer without an intermediate (banks, etc). User hasfull management of its Bitcoin. Bitcoin used for purchases, E-commerce transactions, investments,paymentstoshopfor products. It came into existence by person or group of people called satoshi nakamoto. Bitcoin helps to transferring assets is faster than regular fiat currencies. It has lower transaction fees. It has cryptographically secured. It has entire transaction cryptographically sign and sender and receiver also secure. Bitcoin is that the most open financial set-up tothispoint. You’ll beableto create paymentswithBitcoins24/7 everywhere the planet, even wherever there’s no banking industry. Bitcoin is onymous,andanyonewill openitsnotecasevia thenetwithnone verification or credit history. It’s particularly useful in underbanked regions and third-world countries wherever most of the people struggle to induce access to cash. IJTSRD30222
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 5 You can pay Bitcoins within the same ways that you pay ancient digital cash– froma PC,anitinerantora positiveidentification. Unlike order currencies, Bitcoins area unit deflationary, that means that their worth is ready to understand intentionally. Bitcoin is that the most transportable quality ever-created and might be transferredthroughsatellitesorperhapsradiowaves. Despite makes an attempt to change offline Bitcoin payments, use of the currency still mostly depends onwebaccessibility.As Bitcoin continues to be in development, the group action speed and charges tend to vary betting on mining potency and network congestion. Changing Bitcoins into act incurs fees that area unit usually pricey.Besides everything,there's anabsence of security behind the dealings of Bitcoin. There’s no guarantee to shield your Bitcoins from human error (passwords), sure technical bugs (hard Drive corrupt, Virus). Bitcoin users have full management of the financial operations. They keep safeand private details, therefore there's no likelihood of taken MasterCard and visa numbers. But, All Over,Bitcoinstill isnotfullysafe to process of how to bitcoin transaction used. Bitcoin transaction among peers[7] Fig. Bitcoin transaction Literature Review “Decentralizing Privacy: Using Blockchain to Protect Personal Data” author is Guy Zyskin, Oz Nathan, Alex, research paper Private records, and touchy records in popular, have to not be relied on in the arms of third-parties, where they are at risk of assaults and misuse. the Blockchain knows the users because the proprietors in their private information. Organizations, in turn, can focus on collect records without being overly worried approximately well securing and compartmentalizing them.[2015] “Bitcoin: A Peer-to-Peer Electronic Cash System” in this paperauthorSatoshiNakamotoresearchsay,We'veproposeda gadget for electronic transactions without relying on believe. We started with The usual framework of cash made from digital signatures. Here in research paper all network have their have proof of work to record a all customers history of transactions. Here easy payment authentication. Combining and splitting values explained privacy which algorithm used how to work in bitcoin this explain.[March 2009] ”Bitcoin is a popular peer-to-peer crypto-currency supplying vulnerable anonymity” author is Xiangxue Li and Yu Yu in research paper shows some points to related anonymous like Bitcoin is a popular peer-to-peer crypto-currency supplying vulnerable anonymity. Over the past few years, a big quantity of pioneering paintings focused on mixing transaction that a collection of customers alternate their bitcoins to interrupt the links, but, none of them fulfill all requirements. In this paper, protocol primarily based on the trick of cryptographically secure DKG. It offers stronger anonymity and is compatible with Bitcoin architecture. Subsequently, we analyse the protocol in all respects. [December 2017] “A Survey on Anonymity and Privacy in Bitcoin like Digital Cash Systems” author is Merve Can Kus Khalilov and Albert LeviIn this paper shows the survey which analyses anonymity and privacy studies in Bitcoin-like E-cash systems. In this paper have privacy and anonymity. On this category, author examined and suppliedtaxonomyfor 25studies,and extractedninestrategies and five effects from these research. Cryptographic have some problems to task getting problem. Here also shows the anonymity and privacy way to improve.[2018] “Zerocash: Decentralized Anonymous Payments” author is BitcoinEli Ben-Sasson∗, Alessandro Chiesay, Christina Garmanz, Matthew Green in this paper Zerocash providessuchanonymity,byusinghidingconsumer personal data,transactionamounts, and account balances from Public view. Bitcoin’s scripting language with zk-SNARKsthatallowrapidverificationofexpressive statements. [2014] Research Methodology Nameless manner without a name, Many Bitcoin offerings authentic id, linked profiles can be now not an anonymous with the aid of a ramification of aspect channels that’s the cause of unlinkablility want. Unlinkability defines as very tough to connect special addresses of the identical user, difficult to hyperlink exceptional transactions ofthesameconsumeranddifficulttolink sender of a charge of its receipt. [smartlearn]
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 6 Right here bitcoin nameless communication network used Tor browser. Tor is nameless conversation network. anonymouse use of sender and receiver communication is not connected. Tor utilized by regular users, Journalist, malware and other unlawful manner. Tor is funded by way of U.S. Branch and others. Bitcoin is relaxed and namelessvirtual forex.Bitcoincan'tbe easily tracked back to you and are quicker and safer opportunity to other donation strategies. Here have Basecoin is similar to altcoin. Basecoin may be into zero coins and again breaks link among original and new basecoin. Zerocash is untraceable e coins all the transaction is in the envelope. Ledger simply files life of transactions. No person realize. Bitcoin is depending on blockchain. Every Bitcoin block memorializes a fixed of transactions which are amassed from the Bitcoin broadcast Network. Bitcoin used blockchain features. Here are the features is SHA-256 Encryption here all the encryption is done by algorithm, Blockchain uses cryptographic keys to relaxed identities and hash function to make the blockchain immutable public and personal key the usage of data switch and security the use of keys. It uses SHA 256 stands for the number of bits it takes up in memory securing, hashing and algorithm. Hash value is unique. Value return by hash function its called hash value its impossible to decode original message using hash itself. It doesn’t disclose hash value. SHA 256 is one way function here reverse is not possible that’s make very secure. [3] Fig. Hashcash example Cryptography uses public and private key to encrypt and decrypt data. but private key is only user knows. So user is become anonymous.[8] Fig. Bitcoin transaction processing steps
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30222 | Volume – 4 | Issue – 3 | March-April 2020 Page 7 Proof of work using get solution of problem and represent the decision. I2P using anonymous transaction is done. In zero knowledge protocols, blending is accomplished in a couple of transactions, consequently hyperlinksbetweentransactionsare incomplete. Secure At ease Multiparty Computation (SMC) allows a group of users. Users compute the cost of a publicfunction the usage of their non-public Statistics, even as they maintain their inputs personal Coutu is created the network of transactions approach. Transactions have input and output data have a amount V is show authorised person. Here all the values is constructed using hash tree. All block have counter values this all increased until the hash fulfils these necessities. The Bitcoin detail holds that this prize ought to be decreased each year, in the long run being wiped out through and through. [6] This is bitcoin transaction done through public and private key. Future Enhancement – Sometimes bitcoin public addresses shows their name and addresses here identity reveal and your internet protocol address also match. Bitcoin transaction is saved in public ledger. Anyone access personal information, all those issues create, which is why we use bitcoin mixture. Bitcoin mixture is used to hide id. We used in paper Tor browser search and transaction of currency to anonymous. This also we review in papers. Here another one concept touseinresearchpaper use logless vpn to study. All this havesubjecttostudyrelated in bitcoin used. Here we also used always new transaction address in blockchain to use study material. Conclusion- Here have transaction informationof bitcoinandbitcoin role in our life. The paper discussed way used to anonymous. E- cash should insure a user personal data from his network when conducting financial transactions. customer view. Here we have privacy protection. Here algorithm SHA 256 algorithm used. Cryptocurrencyusinghidesuserdata.All the anonymous transaction used cryptocurrency. References- [1] Guy Zyskind MIT Media Lab and Oz Nathan Tel-Aviv University Cambridge, Alex Sandy PentlandMITMedia Lab Cambridge “Decentralizing Privacy: Using Blockchain to Protect Personal Data”. [2] Satoshi Nakamoto “Bitcoin: A Peer-to-Peer Electronic Cash System” satoshin@gmx.com Available: www.bitcoin.org/bitcoin.pdf [3] Mere Can Kus Khalilov and Albert Levi “A Survey on Anonymity and Privacy in Bitcoin like Digital Cash Systems” 2018. [4] Xiangxue Li and Yu Yu “Bitcoin is a popular peer-to- peer crypto-currency supplying vulnerable anonymity”. December 2017. [5] Ben-Sasson, Alessandro Chiesay, Christina Garmanz, Matthew Greenz, Ian Miersz, Eran Tromerx, Madars Virzay “Zerocash: DecentralizedAnonymousPayments from BitcoinEli Technion, eli@cs.technion.ac.i. 2014. [6] Aviel D. Rubin, Matthew Green, Christina Garman, Ian Miers,” Zerocoin: Anonymous Distributed E-Cashfrom Bitcoin “. [7] Raja Sreedharan, Rejikumar and Drishti Marwaha, Singapore University of Technology and Design, Kochi, Amrita Vishwa Vidyapeetham, India “A literature review on Bitcoin Arunmozhi Manimuthu”. [8] Mauro Conti, Sandeep Kumar E, Chhagan Lal, IEEE, Sushmita Ruj, IEEE “A Survey on Security and Privacy Issues of Bitcoin”.