Eduard de Jong - Academia.edu (original) (raw)

Papers by Eduard de Jong

Research paper thumbnail of How the King returns: A digital future for cash

, 2024

Electronic cash (e-cash) is a form of money with all the features of traditional cash including p... more Electronic cash (e-cash) is a form of money with all the features of traditional cash including privacy protection, immediate settlement and no fees. E-cash can be deployed as CBDC enabling identity-free payments of any amount by anone to anyone at any timem and anywhere, face to face or online. Citizens, businesses, banks and government agencies store e-cash in dedicated IT devices with scalable levels of physical security. Aggregating Receipt Tokens (ART) technology, presented here, enables an e-cash system that provides society with a highly scalable, very resilient payment infrastructure with fully decentralised, secure digital payments with payer anonymity while enforcing AML with strong protection of payee privacy. This infrastructure consists of two principal components i) an electronic purse (e-purse) as a digital bearer payment instrument to store, pay and receive e-cash and ii) an issuer as the provider of e-cash liquidity as a type of money fully integrated in a monetary system and the guarantor of its value and security. The IT architecture presented here can realise a continental-scale e-cash system to enable a cash-like, digital economy.

Research paper thumbnail of Towards testability in smart card operating system design

Smart Card Research and Advanced Application Conference, Oct 1, 1994

... respectively. The IP Open command is parameterised with the names of the CSA and the CTA to b... more ... respectively. The IP Open command is parameterised with the names of the CSA and the CTA to be opened. Once opened, a smart card application will accept any of a number of regular instructions, until the application is closed. ...

Research paper thumbnail of Visualising the structure of an IC-card security architecture

Research paper thumbnail of Methods and apparatus for deployment of high integrity software using static procedure return addresses

Research paper thumbnail of Structuring and Visualising an IC-card Security Standard

Smart Card Research and Advanced Application Conference, Sep 1, 1996

Research paper thumbnail of A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations

Lecture Notes in Computer Science, 2001

Research paper thumbnail of Java Card†: An analysis of the most successful smart card operating system to date

CTIT technical report series, Oct 1, 2005

Research paper thumbnail of Cash: The once and future king

self, 2023

It's time to bring order to digital money through the proper issuance of Central Bank Digital Cur... more It's time to bring order to digital money through the proper issuance of Central Bank Digital Currency (CBDC). While many financial services moved to the digital realm based on centralised account ledgers, there remains an unmet need for a cash-like, distributed, digital, bearer payment instrument. A hodgepodge of existing proprietary electronic cash (e-cash) products have shown this need can be met, but only in fragmented, disconnected walled gardens. Only a central bank can be the issuer of an e-cash instrument that brings the traditional benefits of cash to the digital world. Every economy in the world will benefit when its central bank issues a digital currency. To enable reaching this goal, I have developed a formal model for money as an information system. This model includes Cash as one form of distributed money. Based on this model I have developed aggregating token technology as an e-cash implementation to deliver the key benefits of physical cash to the digital world. It supports online and offline transactions that can be securely received with a software-only implementation. A money system based on this technology supports both monetary and security management. This aggregating token e-cash solution is the only technology that meets all of the key requirements for CBDC.

Research paper thumbnail of Systems

Using formal methods to cultivate trust in smart card operating systems

Research paper thumbnail of Protection de la confidentialite renforcee lors de l'identification dans un reseau de transmission de donnees

L'invention concerne un procede permettant de renforcer la protection de la confidentialite l... more L'invention concerne un procede permettant de renforcer la protection de la confidentialite lors de l'identification dans un reseau de transmission de donnees. Ce procede consiste a s'inscrire a un service sur le reseau de transmission de donnees; a recevoir un identifiant aleatoire (ID) en reponse a l'inscription; a stocker l'identifiant aleatoire, puis a l'utiliser pour obtenir des services sur le reseau de transmission de donnees. L'invention concerne egalement un dispositif permettant d'obtenir un service sur un reseau de transmission de donnees; lequel dispositif comprend une autorite d'inscription configuree pour accepter une demande d'inscription et pour renvoyer les resultats de l'inscription en reponse a la demande d'inscription. Les resultats d'inscription contiennent les donnees utilisateur; ces resultats d'inscription peuvent etre utilises pour obtenir un service chez un prestataire de services.

Research paper thumbnail of Smart cards and card operating systemsPieter

The operating system of an IC card should provide an appropriate interface to applications using ... more The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefcient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system design. The actual design that we recognise as UNIX (or any other current operating system for that matter) is not appropriate for IC cards.

Research paper thumbnail of Java Card: An analysis of the most successful smart card operating system to date

Research paper thumbnail of ElectronIc Money: From cryptography and smart cards to BItcoIn and beyond

Fraunhofer Smart Card Workshop, 2017

This paper describes the emergence of electronic money since the early nineteen-nineties from the... more This paper describes the emergence of electronic money since the early nineteen-nineties from the perspective of one of the people involved in the early stages in its development. It presents never before published details of the first version of an electronic money system implemented in 1990 by DigiCash. It also describes a number of other electronic money systems created later.

Research paper thumbnail of Transacted Memory for Smart Cards

Lecture Notes in Computer Science, 2001

Research paper thumbnail of Techniques for implementing security on a small footprint device using a context barrier

Research paper thumbnail of Using formal methods to cultivate trust in smart card operating systems

Research paper thumbnail of A Java Reference Model of Transacted Memory for

Transacted Memory o#ers persistence, undoability and auditing. We present a Java/JML Reference Mo... more Transacted Memory o#ers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part (based on our Z model), with a detailed implementation in the Java part (based on our C implementation).

Research paper thumbnail of A Java Reference Model of Transacted Memory for Smart Cards

Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference M... more Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part (based on our Z model), with a detailed implementation in the Java part (based on our C implementation).

Research paper thumbnail of Provisioning for digital content access control

Research paper thumbnail of A Java Reference Model of Transacted Memory for Smart Cards

Permission is granted for noncommercial reproduction of the work for educational or research purp... more Permission is granted for noncommercial reproduction of the work for educational or research purposes.

Research paper thumbnail of How the King returns: A digital future for cash

, 2024

Electronic cash (e-cash) is a form of money with all the features of traditional cash including p... more Electronic cash (e-cash) is a form of money with all the features of traditional cash including privacy protection, immediate settlement and no fees. E-cash can be deployed as CBDC enabling identity-free payments of any amount by anone to anyone at any timem and anywhere, face to face or online. Citizens, businesses, banks and government agencies store e-cash in dedicated IT devices with scalable levels of physical security. Aggregating Receipt Tokens (ART) technology, presented here, enables an e-cash system that provides society with a highly scalable, very resilient payment infrastructure with fully decentralised, secure digital payments with payer anonymity while enforcing AML with strong protection of payee privacy. This infrastructure consists of two principal components i) an electronic purse (e-purse) as a digital bearer payment instrument to store, pay and receive e-cash and ii) an issuer as the provider of e-cash liquidity as a type of money fully integrated in a monetary system and the guarantor of its value and security. The IT architecture presented here can realise a continental-scale e-cash system to enable a cash-like, digital economy.

Research paper thumbnail of Towards testability in smart card operating system design

Smart Card Research and Advanced Application Conference, Oct 1, 1994

... respectively. The IP Open command is parameterised with the names of the CSA and the CTA to b... more ... respectively. The IP Open command is parameterised with the names of the CSA and the CTA to be opened. Once opened, a smart card application will accept any of a number of regular instructions, until the application is closed. ...

Research paper thumbnail of Visualising the structure of an IC-card security architecture

Research paper thumbnail of Methods and apparatus for deployment of high integrity software using static procedure return addresses

Research paper thumbnail of Structuring and Visualising an IC-card Security Standard

Smart Card Research and Advanced Application Conference, Sep 1, 1996

Research paper thumbnail of A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations

Lecture Notes in Computer Science, 2001

Research paper thumbnail of Java Card†: An analysis of the most successful smart card operating system to date

CTIT technical report series, Oct 1, 2005

Research paper thumbnail of Cash: The once and future king

self, 2023

It's time to bring order to digital money through the proper issuance of Central Bank Digital Cur... more It's time to bring order to digital money through the proper issuance of Central Bank Digital Currency (CBDC). While many financial services moved to the digital realm based on centralised account ledgers, there remains an unmet need for a cash-like, distributed, digital, bearer payment instrument. A hodgepodge of existing proprietary electronic cash (e-cash) products have shown this need can be met, but only in fragmented, disconnected walled gardens. Only a central bank can be the issuer of an e-cash instrument that brings the traditional benefits of cash to the digital world. Every economy in the world will benefit when its central bank issues a digital currency. To enable reaching this goal, I have developed a formal model for money as an information system. This model includes Cash as one form of distributed money. Based on this model I have developed aggregating token technology as an e-cash implementation to deliver the key benefits of physical cash to the digital world. It supports online and offline transactions that can be securely received with a software-only implementation. A money system based on this technology supports both monetary and security management. This aggregating token e-cash solution is the only technology that meets all of the key requirements for CBDC.

Research paper thumbnail of Systems

Using formal methods to cultivate trust in smart card operating systems

Research paper thumbnail of Protection de la confidentialite renforcee lors de l'identification dans un reseau de transmission de donnees

L'invention concerne un procede permettant de renforcer la protection de la confidentialite l... more L'invention concerne un procede permettant de renforcer la protection de la confidentialite lors de l'identification dans un reseau de transmission de donnees. Ce procede consiste a s'inscrire a un service sur le reseau de transmission de donnees; a recevoir un identifiant aleatoire (ID) en reponse a l'inscription; a stocker l'identifiant aleatoire, puis a l'utiliser pour obtenir des services sur le reseau de transmission de donnees. L'invention concerne egalement un dispositif permettant d'obtenir un service sur un reseau de transmission de donnees; lequel dispositif comprend une autorite d'inscription configuree pour accepter une demande d'inscription et pour renvoyer les resultats de l'inscription en reponse a la demande d'inscription. Les resultats d'inscription contiennent les donnees utilisateur; ces resultats d'inscription peuvent etre utilises pour obtenir un service chez un prestataire de services.

Research paper thumbnail of Smart cards and card operating systemsPieter

The operating system of an IC card should provide an appropriate interface to applications using ... more The operating system of an IC card should provide an appropriate interface to applications using IC cards. An incorrect choice of operations and data renders the card inefcient and cumbersome. The design principles of the UNIX operating system are most appropriate for IC card operating system design. The actual design that we recognise as UNIX (or any other current operating system for that matter) is not appropriate for IC cards.

Research paper thumbnail of Java Card: An analysis of the most successful smart card operating system to date

Research paper thumbnail of ElectronIc Money: From cryptography and smart cards to BItcoIn and beyond

Fraunhofer Smart Card Workshop, 2017

This paper describes the emergence of electronic money since the early nineteen-nineties from the... more This paper describes the emergence of electronic money since the early nineteen-nineties from the perspective of one of the people involved in the early stages in its development. It presents never before published details of the first version of an electronic money system implemented in 1990 by DigiCash. It also describes a number of other electronic money systems created later.

Research paper thumbnail of Transacted Memory for Smart Cards

Lecture Notes in Computer Science, 2001

Research paper thumbnail of Techniques for implementing security on a small footprint device using a context barrier

Research paper thumbnail of Using formal methods to cultivate trust in smart card operating systems

Research paper thumbnail of A Java Reference Model of Transacted Memory for

Transacted Memory o#ers persistence, undoability and auditing. We present a Java/JML Reference Mo... more Transacted Memory o#ers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part (based on our Z model), with a detailed implementation in the Java part (based on our C implementation).

Research paper thumbnail of A Java Reference Model of Transacted Memory for Smart Cards

Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference M... more Transacted Memory offers persistence, undoability and auditing. We present a Java/JML Reference Model of the Transacted Memory system on the basis of our earlier separate Z model and C implementation. We conclude that Java/JML combines the advantages of a high level specification in the JML part (based on our Z model), with a detailed implementation in the Java part (based on our C implementation).

Research paper thumbnail of Provisioning for digital content access control

Research paper thumbnail of A Java Reference Model of Transacted Memory for Smart Cards

Permission is granted for noncommercial reproduction of the work for educational or research purp... more Permission is granted for noncommercial reproduction of the work for educational or research purposes.