Peppercoin is a cryptographic system for processing micropayments. Peppercoin Inc. was a company that offers services based on the peppercoin method.
The peppercoin system was developed by Silvio Micali and Ron Rivest and first presented at the RSA Conference in 2002 [1] (although it had not yet been named.) The core idea is to bill one randomly selected transaction a lump sum of money rather than bill each transaction a small amount. It uses "universal aggregation", which means that it aggregates transactions over users, merchants as well as payment service providers. The random selection is cryptographically secure -- it cannot be influenced by any of the parties. It is claimed to reduce the transaction cost per dollar from 27 cents to "well below 10 cents." [2]
Peppercoin, Inc. was a privately held company founded in late 2001 by Micali and Rivest based in Waltham, MA. It has secured about $15M in venture capital in two rounds of funding. [3] [4] Its services have seen modest adoption. [5] [6] Peppercoin collects 5-9% of transaction cost from the merchant. [7] Peppercoin, Inc. was bought out in 2007 by Chockstone for an undisclosed amount. [4]
In cryptography, key size or key length is the number of bits in a key used by a cryptographic algorithm.
A debit card is a plastic payment card that can be used instead of cash when making purchases. It is similar to a credit card, but unlike a credit card, the money is immediately transferred directly from the cardholder's bank account when performing any transaction.
A digital signature is a mathematical scheme for verifying the authenticity of digital messages or documents. A valid digital signature, where the prerequisites are satisfied, gives a recipient very strong reason to believe that the message was created by a known sender (authentication), and that the message was not altered in transit (integrity).
Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value. The token is a reference that maps back to the sensitive data through a tokenization system. The mapping from original data to a token uses methods that render tokens infeasible to reverse in the absence of the tokenization system, for example using tokens created from random numbers. The tokenization system must be secured and validated using security best practices applicable to sensitive data protection, secure storage, audit, authentication and authorization. The tokenization system provides data processing applications with the authority and interfaces to request tokens, or detokenize back to sensitive data.
Ronald Linn Rivest is a cryptographer and an Institute Professor at MIT. He is a member of MIT's Department of Electrical Engineering and Computer Science (EECS) and a member of MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL). His work has spanned the fields of algorithms and combinatorics, cryptography, machine learning, and election integrity.
Articles related to cryptography include:
RSA Security LLC, formerly RSA Security, Inc. and doing business as RSA, is an American computer and network security company with a focus on encryption and encryption standards. RSA was named after the initials of its co-founders, Ron Rivest, Adi Shamir and Leonard Adleman, after whom the RSA public key cryptography algorithm was also named. Among its products are the RSA BSAFE cryptography libraries and the SecurID authentication token. RSA is known for allegedly incorporating backdoors developed by the NSA in its products. It also organizes the annual RSA Conference, an information security conference.
Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1983. It was realized through his corporation Digicash and used as micropayment system at one US bank from 1995 to 1998.
A micropayment is a financial transaction involving a very small sum of money and usually one that occurs online. A number of micropayment systems were proposed and developed in the mid-to-late 1990s, all of which were ultimately unsuccessful. A second generation of micropayment systems emerged in the 2010s.
Shafrira "Shafi" Goldwasser is an Israeli-American computer scientist and winner of the Turing Award in 2012. She is the RSA Professor of Electrical Engineering and Computer Science at MIT, a professor of mathematical sciences at the Weizmann Institute of Science, Israel, co-founder and chief scientist of Duality Technologies and the director of the Simons Institute for the Theory of Computing in Berkeley, CA.
BitPass was an American company from 2002-2007 that developed an online payment system for digital content and services including micropayments. One of its best-known projects was the Mperia online music store catering to unsigned artists.
Information leakage defines as actions of revealing information to an unauthorized party. Human factors cause the issue of information leakage. Human factors can be categorized as intentional actions and unintentional actions. An example of intentional action is that employees take risk of wreaking vengeance on the company due to dissatisfaction with the company. The example of unintentional action is that new employees are negligent of risk behaviors due to the over-enthusiasm for new ideas. Information leakage happens whenever a system that is designed to be closed to an eavesdropper reveals some information to unauthorized parties nonetheless. For example, when designing an encrypted instant messaging network, a network engineer without the capacity to crack encryption codes could see when messages are transmitted, even if he could not read them. During the Second World War, the Japanese used secret codes such as PURPLE. Even before such codes were cracked, some basic information could be extracted about the content of the messages by looking at which relay stations sent a message onward.
Secure Electronic Transaction (SET) is a communications protocol standard for securing credit card transactions over networks, specifically, the Internet. SET was not itself a payment system, but rather a set of security protocols and formats that enabled users to employ the existing credit card payment infrastructure on an open network in a secure fashion. However, it failed to gain attraction in the market. Visa now promotes the 3-D Secure scheme.
Silvio Micali is an Italian computer scientist at MIT Computer Science and Artificial Intelligence Laboratory and a professor of computer science in MIT's Department of Electrical Engineering and Computer Science since 1983. His research centers on the theory of cryptography and information security.
CertCo was a financial cryptography startup spun out of Bankers Trust in the 1990s. The company pioneered a risk management approach to cryptographic services. It had offices in New York City and Cambridge, Massachusetts. It offered three main public key infrastructure (PKI) based products: an Identity Warranty system ; an electronic payment system ; and an Online Certificate Status Protocol (OCSP) responder for validating X.509 public key certificates. It went out of business in Spring 2002 never having found a wide market for its products despite filing a number of patents and developing new technology.
A hardware security module (HSM) is a physical computing device that safeguards and manages digital keys, performs encryption and decryption functions for digital signatures, strong authentication and other cryptographic functions. These modules traditionally come in the form of a plug-in card or an external device that attaches directly to a computer or network server. A hardware security module contains one or more secure cryptoprocessor chips.
DigiCash Inc. was an electronic money corporation founded by David Chaum in 1989. DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in 1998 and subsequently sold its assets to eCash Technologies, another digital currency company, which was acquired by InfoSpace on Feb. 19, 2002.
A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts plus the other agreed charges. The card issuer creates a revolving account and grants a line of credit to the cardholder, from which the cardholder can borrow money for payment to a merchant or as a cash advance.
A card not present transaction is a payment card transaction made where the cardholder does not or cannot physically present the card for a merchant's visual examination at the time that an order is given and payment effected. It is most commonly used for payments made over Internet, but also mail-order transactions by mail or fax, or over the telephone.
Comparison of payment systems is a list displaying comparative information and fee rates on various payment systems. Information such as these are compared and shown: seller's/merchant's fees, buyer's fees, banking transfer fees, clearing-house fees, interchange fees, chargeback/return fees, currency conversion fees, monthly fees, usage, verification time, deposit time, technology support, customer-service quality, etc.
This money or currency-related article is a stub. You can help Wikipedia by expanding it. |