Offline Payment of Central Bank Digital Currency Based on a Trusted Platform Module
Abstract
:1. Introduction
2. Literature Review
3. Methodology
3.1. Core Features of Proposed Model
- Applying the TPM and its counter: The TPM was developed by the Trusted Computing Group (TCG) [23]. The TPM fundamentally consists of hardware-based cryptographic chips and a standardized framework for managing these chips through embedded software, which enhances compatibility among various cryptographic components. The TPM specification was formalized as ISO/IEC 11889 in 2015. Specifically, the TPM functions as a system-independent security chip designed to be impervious to external access. Utilizing this characteristic, the TPM generates and securely stores cryptographic keys and executes cryptographic operations internally to ensure robust security. In the TPM 2.0 specification, the rights of the user and the platform owner are restricted, preventing users from modifying the TPM’s functionalities [24]. The TPM is widely utilized across various devices, including smartphones and notebook PCs. The main functions of a TPM encompass boot security, authentication, data protection, device protection, and the prevention of unauthorized access [25,26,27]. Moreover, TPM 2.0 introduces a versatile monotonic counter stored in non-volatile memory, characterized by a non-decreasing value that is resistant to tampering due to its internal location within the TPM. This monotonic counter is particularly advantageous, as it can be employed in conjunction with specific messages to ascertain whether a message has been reused. A study conducted by Sarmenta et al. demonstrated the feasibility of implementing a secure payment method utilizing the TPM’s monotonic counter within an untrusted platform [28]. In the present study, the monotonic counter within an offline platform is employed to detect instances of double spending, and detailed payment processes will be presented in the subsequent section.
- Applying the ID (identification) certificate: Each offline CBDC wallet is equipped with a public key pair within the TPM for transaction purposes and is secured by an ID certificate issued by the CBDC institution or a Certificate Authority. Subscribers are required to verify their identity upon receipt of the ID certificate, which contains an identifier for the subscriber’s offline CBDC wallet rather than their actual name. This identifier must not be linked to any personal information of the subscriber and is utilized for administrative purposes by the CBDC institution. The certificate is included and transmitted with the transaction. To enhance efficiency, particularly in terms of ID certificate validation and verification, it is essential that all such certificates share the same domain or root.
- Applying the JSON Web Token (JWT) for offline CBDC format: JWT is a standard established by the Internet Engineering Task Force (IETF), RFC 7519. It is widely employed in web applications for the secure transmission of information, particularly in the areas of authentication and authorization. A JWT consists of three components, which are separated by dots: Header.Payload.Signature. Given that JWT supports both public key digital signatures and private claims for specialized applications, it can be effectively utilized in offline CBDC implementations. While the Header and Signature components conform to the JWT standard, the Payload component requires a new definition specifically designed for offline CBDC applications. The following seven claims have been newly defined, as illustrated in Table 2. It is essential that all of these claims be regarded as mandatory within the context of offline CBDC tokens.
- Header: {“alg”:”ES256”,”typ”;”JWT”}
- Payload: {“cbSta”:”O2”,”cbRt”:”679”,”cbOwn”:”WOff1039”,”cbOtcn”:”16”,”cbAmt”:”$60”, “cbEds”: “WOff9120”,”cbEtcn”:”981”}
- Signature (with ECDSA-SHA256 algorithm): {kvwd02iy9zq6lwFsnbG4Gz-aXUJXzV vyQC1BseLWfIrzncHA1IN32EZbVByMAV8mqHqvwNdGqQafviT3GG7kG Q}
- Encoded offline CBDC JWT (base64) = eyJhbGciOiJFUzI1NiIsInR5cCI6IkpXVCJ9.-eyJjYlN0YSI6Ik8yIiwiY2JSdCI6IjY3OSIsImNiT3duIjoiV09mZjEwMzkiLCJjYk90Y24i OiIxNiIsImNiQW10IjoiJDYwIiwiY2JFZHMiOiJXT2ZmOTEyMCIsImNiRXRjbiI6Ijk4 MSJ9.kvwd02iy9zq6lwFsnbG4Gz-aXUJXzVvyQC1BseLWfIrzncHA1IN32EZbVByM AV8mqHqvwNdGqQafviT3GG7kGQ
- 4.
- Separation of offline CBDC wallet from online CBDC wallet: Offline wallets are utilized exclusively in scenarios where they are completely offline, and the offline tokens are initially derived from online tokens, as illustrated in Figure 3. Payment tokens that are utilized in online transactions can be transferred to offline environments through established procedures; conversely, offline payment tokens can be converted back into online tokens. It is important to note that while various types of online payment tokens and transactions are prevalent in the real world, this study focuses solely on the payment processes involving tokens within offline wallets, which operate in a completely offline context. Furthermore, the offline tokens examined in this study are not self-generated; rather, they are structured such that one party in the transaction generates and guarantees the token for the other party. And the conversion of online tokens to offline tokens necessitates a procedure that includes a guarantee from a CBDC operator, which will be the subject of future research.
- 5.
- Secure P2P communication: The offline payment mechanism for CBDC should utilize a peer-to-peer (P2P) data exchange mode that relies on short-range wireless communication technologies, such as Bluetooth and NFC. Furthermore, each payment message must be transmitted and received through a secure channel established between offline wallets. However, the process of establishing this secure channel for P2P communication is beyond the scope of the present study. Therefore, it is assumed that CBDC transactions take place over a secure wireless communication network. All short-range communication sessions for offline transactions involving CBDC must be encrypted using a temporarily generated key.
- 6.
- Use of all valid tokens for input: All valid tokens held by the sender must be employed concurrently during the payment process. Therefore, each payment transaction necessitates the inclusion of all valid tokens from the sender as input, while simultaneously converting the payment amount and the sender’s remaining balance into two output tokens. This procedure is crucial for the effective management of valid tokens.
3.2. Notations and Definitions
- Auth-code:User authentication code for Offline CBDC wallet execution.
- RX: Random number of entity X.
- RT: Transaction number. See the equation in Step 9–2
- PKX: Public key pair of entity X for digital signature.
- SKX: Symmetric key of entity X for encryption of information in OffCW.
- SRKX: Symmetric key of entity X’s TPM for encryption of SKX.
- Cert_X: OffCW’s digital certificate (ID certificate) of entity X.
- IDX: OffCW’s ID of entity X in ID certificate.
- CX: Monotonic counter value of entity X’s TPM.
- Bal_X: Token balance of entity X.
- ESKx{M}: Message M is encrypted with symmetric key SKX.
- DSKx{M}: Message M is decrypted with symmetric key SKX.
- SignPKx{M}: The signing value of message M with private key PKX.
- Verify{M}: The legitimacy of the message M is verified by the digital signature, calculation etc.
- Req{M}: Request for message M.
- Req{“M”}: Request action of message M.
: Communication between applications on the device.
: Communication between devices.
3.3. Offline CBDC Model Protocol
Step (1) A (Sender) | Auth-code (program activate), Req{“Choose a Sender service”} | |
B (Receiver) | Auth-code (program activate), Req{“Choose a Receiver service”} | |
Step (2) OffCW_B | Req{RB, CB, “Decrypt ESRKB{SKB}”} | |
Step (3) TPM_B | ||
Step (4) OffCW_A: | Verify{MB} | |
Step (5) OffCW_A | Req{“Input Payment”, “Verify IDB”} | |
Step (6) A (Sender) | Input the payment amount “T” | |
Step (7) OffCW_A | Req{RA, “Increase CA”, “Decrypt ESRKA{SKA}”} | |
Step (8) TPM_A | MA = [RA, CA + 1, SKA, Cert_A] | |
Step (9) OffCW_A: | DSKA{Valid tokens, Cert_N} | |
(9–1) SUM = N”, where “cbAmtN” is the valid input token’s “cbAmt”. (9–2) K = SUM − T, RT = [{(N) + RA + RB + CA + 1+CB} mod RA] + RA, where “cbRtN” is the valid input token’s RT (9–3) gen_A = Header.Payload{“cbSta”:”Tp”,”cbRt”:RT,”cbOwn”:IDA,”cbOtcn”:CA + 1, “cbAmt”: K,”cbEds”:IDB,”cbEtcn”:CB} where, the “Header” will be defined by CBDC institution. (9–4) gen_B = Header.Payload{“cbSta”:”OX “,”cbRt”:RT,”cbOwn”:IDB,”cbOtcn”:CB, “cbAmt”:T,”cbEds”:IDA,”cbEtcn”:CA + 1} where, X in “OX” is the value by adding 1 to the largest number of N in input valid token’s cbSta. (input tokens = valid tokens). | ||
Step (10) OffCW_A | gen_A, gen_B, Req{“Sign gen_A”, “Sign gen_B”, “if Bal_A = SUM, True, False”} | |
Step (11) TPM_A | SignPKA{gen_A}, SignPKA{gen_B}, True | |
Step (12) OffCW_A: | Token_t = Header.gen_A.SignPKA{gen_A}, Token_B = Header.gen_B.SignPKA{gen_B} | |
Step (13) OffCW_A | MA = [Token_t, Token_B, Cert_A, Input tokens and related tokens, Cert_N, RA] | |
Step (14) OffCW_B: | Verify{MA}, ESKB{Token_B, Cert_A, Input tokens, Cert_N} | |
(14–1) new_gen_A = Header.Payload {“cbSta”:”OX”,”cbRt”:RT,”cbOwn”:IDA,”cbOtcn”: CA + 1,”cbAmt”:K,”cbEds”:IDB,”cbEtcn”:CB} | ||
tep (15) OffCW_B | new_gen_A, Req{“Sign new_gen_A”, “Balance update: Bal_B + T} | |
Step (16) OffCW_B | Req{“Confirm the amount T and the balance displayed on the screen”} | |
Step (17) TPM_B Token_A = Header.new_gen_A.SignPKB{new_gen_A} | ||
Step (18) OffCW_A: | Verify{Token_A}, ESKA{Token_A, Cert_B, Input tokens, Cert_N} | |
Step (19) OffCW_A | Req{“Balance update: Bal_A = K”} | |
Step (20) OffCW_A | Req{“Confirm the balance displayed on the screen”} |
4. Results and Discussion
4.1. Experimental Results of Offline CBDC Token (JWT) and Comparisons
- OS–Ubuntu 20.04 LTS,
- TPM simulator–IBMtpm1661,
- TPM software stack–tpm2-tss-3.1.0,
- Resource management daemon–tpm2-abrmd-2.3.1,
- TPM tool–tpm2-tools-4.3.2
- Token = eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJjYlN0YSI6Ik8yIiwiY2JSdCI6Ij Y3OSIsImNiT3duIjoiV09mZjEwMzkiLCJjYk90Y24iOiIxNiIsImNiQW10IjoiJDYwIi wiY2JFZHMiOiJXT2ZmOTEyMCIsImNiRXRjbiI6Ijk4MSJ9.ABQACwEAMj2EVJ7B esO4a3KXKTFWabZ8WyNZZsltIDMghd06ahFTM86qwH11EtgN-h8PSe0tJYQhmg Lp6aLsJZ7jOR7dyMtikhE0SO_ZAY3gEqojvHTEm12c4yv8xDnPKkzSsZKSf3IVX_ VLbXikYoSRYQ9oMQgSeb20VbO2m2srAcLrnIII-ywK4uZp0fMjhlOJ-eUWhr-q3g6 c80BdcS4O0M_e9iZosXH8BUzuGpJJiCU9qTCC0aLSsodaOHb1aaf-2CX1NAjSHlIZ wXoB5jepuVLtBa7vqBGsvqLGjSQqCmcnb9JCT8pYhQ5DgQk4q248HJ4NBze7Qx XAlRLhJ5u3eD-bIg==
4.2. Token Forgery and Non-Repudiation
4.3. CBDC Wallet and TPM Security
4.4. Double Spending
4.5. Verifiability and Anonymity
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Boar, C.; Holden, H.; Wadsworth, A. Impending Arrival—A Sequel to the Survey on Central Bank Digital Currency; Bank for International Settlement: Basel, Switzerland, 2020; No. 107; Available online: https://www.bis.org/publ/bppdf/bispap107.htm (accessed on 5 December 2024).
- Bank of Korea. Central Bank Digital Currency Global Discussion Trends by Key Issues (Korean); Bank of Korea: Seoul, Republic of Korea, 2022; ISBN 979-11-5538-618-7. Available online: https://www.bok.or.kr/portal/bbs/B0000232/view.do?nttId=10068651&menuNo=200706&pageIndex=1 (accessed on 5 December 2024).
- Bank for International Settlements. Central Bank Digital Currencies. In Bank for International Settlements Markets Committee Papers; Bank for International Settlement: Basel, Switzerland, 2018; No. 174; Available online: https://www.bis.org/cpmi/publ/d174.htm (accessed on 5 December 2024).
- Bank for International Settlements. CBDCs: An opportunity for the monetary system. In BIS Annual Economic Report; Bank for International Settlement: Basel, Switzerland, 2021; Available online: https://www.bis.org/publ/arpdf/ar2021e3.htm (accessed on 5 December 2024).
- Armelius, H.; Claussen, C.; Hull, I. On the possibility of a cash-like CBDC. Sveriges Riksbank Staff memo. 2021. Available online: https://www.riksbank.se/globalassets/media/rapporter/staff-memo/engelska/2021/on-the-possibility-of-a-cash-like-cbdc.pdf (accessed on 5 December 2024).
- Yoon, J.; Kim, Y. Comparative analysis on digital currency models and electronic payment. J. Korea Contents Assoc. 2022, 22, 63–72. [Google Scholar] [CrossRef]
- Ahnert, T.; Hoffmann, P.; Monnet, C. The Digital Economy, Privacy, and CBDC. ECB Working Paper. 2024. Available online: https://www.ecb.europa.eu/pub/pdf/scpwps/ecb.wp2662~fa8429a967.en.pdf (accessed on 5 December 2024).
- Karama, G.; Androulaki, E.; Capkun, S. Double-spending attacks on fast payments in Bitcoin. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, USA, 16–18 October 2012. [Google Scholar] [CrossRef]
- Bank for International Settlements. Project Polaris: Handbook for Offline Payments with CBDC; Bank for International Settlements: Basel, Switzerland, 2023; Available online: https://www.bis.org/publ/othp64.htm (accessed on 5 December 2024).
- Minwalla, C.; Miedema, J.; Hernandez, S.; Sutton-Lalani, A. A Central Bank Digital Currency for Offline Payments; Bank of Canada: Ottawa, ON, Canada, 2023; Available online: https://www.bankofcanada.ca/2023/02/staff-analytical-note-2023-2/ (accessed on 5 December 2024).
- European Central Bank. Calls for Applications for Digital Euro Component Providers; European Central Bank: Frankfurt, Germany, 2024; Available online: https://www.ecb.europa.eu/paym/intro/news/html/ecb.mipnews240103_1.en.html (accessed on 5 December 2024).
- Dmitrienko, A.; Noack, D.; Yung, M. Secure Wallet-Assisted Offline Bitcoin Payments with Double-Spender Revocation. In Proceedings of the ASIA CCS’17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Abu Dhabi, United Arab Emirates, 2–6 April 2017. [Google Scholar] [CrossRef]
- Aboulaiz, L.; Akintade, B.; Daud, H.; Lansey, M.; Rodden, M.; Sawyer, L.; Yip, M. Offline Payments: Implications for Reliability and Resiliency in Digital Payment Systems. In FEDS Notes; Board of Governors of the Federal Reserve System: Washington, DC, USA, 2024. Available online: https://www.federalreserve.gov/econres/notes/feds-notes/offline-payments-implications-for-reliability-and-resiliency-in-digital-payment-systems-20240816.html (accessed on 5 December 2024).
- Collect Payments While Offline. Stripe Docs. Available online: https://stripe.com/docs/terminal/features/operate-offline/collect-payments (accessed on 5 December 2024).
- Operate Offline. Stripe Docs. Available online: https://stripe.com/docs/terminal/features/operate-offline/overview (accessed on 5 December 2024).
- Reserve Bank of India. Framework for Facilitating Small Value Digital Payments in Offline Mode; Reserve Bank of India Notifications; Reserve Bank of India: Kolkata, India, 2022; Available online: https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=12215&Mo (accessed on 5 December 2024).
- National Payments Corporation of India (NPCI). UPI Lite Product Overview. Available online: https://www.npci.org.in/what-we-do/upi-lite/product-overview (accessed on 11 December 2024).
- Netto, C.; Guimaraes, C. Method for Payment Authorization on Offline Mobile Devices with Irreversibility Assurance. U.S. Patent 11,481,766, 25 October 2022. Available online: https://patentimages.storage.googleapis.com/3d/fa/a4/a5043f2dba33d3/US11481766.pdf (accessed on 11 December 2024).
- Crunchfish Offline Payments. Available online: https://www.crunchfish.com/digital-cash/ (accessed on 11 December 2024).
- V-OS Virtual Secure Element. Available online: https://www.v-key.com/wp-content/uploads/2019/07/V-OS-Virtual-Secure-Element-2022-3.pdf (accessed on 11 December 2024).
- Park, K.; Baek, S. Opera: A Complete Offline and Anonymous Digital Cash Transaction System with a One-Time Readable Memory. IEICE Trans. Inf. Syst. 2017, 100, 2348–2356. [Google Scholar] [CrossRef]
- Chu, Y.; Lee, J.; Kim, S.; Kim, H.; Yoon, Y.; Chung, H. Review of Offline Payment Function of CBDC Considering Security Requirements. Appl. Sci. 2022, 12, 4488. [Google Scholar] [CrossRef]
- Trusted Computing Group. Available online: https://trustedcomputinggroup.org (accessed on 11 December 2024).
- Rossow, T. TPM 2.0, UEFI and Their Impact on Security and Users Freedom. Master’s Thesis, Fachhochschule Hannver University of Applied Sciences and Arts, Hanover, Germany, 2013. Available online: https://api.semanticscholar.org/CorpusID:61256869 (accessed on 11 December 2024).
- Arthur, W.; Challener, D.; Goldman, K. A Practical Guide to TPM 2.0; Apress: New York, NY, USA, 2015; Available online: https://link.springer.com/book/10.1007/978-1-4302-6584-9 (accessed on 11 December 2024).
- Lee, K.; Kim, B.; Kim, J.; Cho, J. RSA key management method for TPM-based OpenSSL to Securely distributed session keys. In Proceedings of the Korea Computer Congress 2016 by The Korean Institute of Information Scientists and Engineers, Jeju, Republic of Korea, 29 June–1 July 2016. [Google Scholar]
- Tomlinson, A. Smart Cards, Tokens, Security and Applications—Introduction to the TPM; Springer: New York, NY, USA, 2017; pp. 173–191. Available online: https://link.springer.com/book/10.1007/978-3-319-50500-8 (accessed on 11 December 2024).
- Sarmenta, L.; Dijk, M.; O’Donnell, C.; Rhodes, J.; Devadas, S. Virtual Monotonic Counters and Count-limited Objects using a TPM without a Trusted OS. In Proceedings of the STC’06: Proceedings of the First ACM Workshop on Scalable Trusted Computing, Alexandria, VA, USA, 3 November 2006; pp. 27–42. [CrossRef]
- Lee, J.; Woo, S. Digital Wallet’s Threats and Security Requirements Analysis (Korean); Korea Internet & Security Agency: Seoul, Rupublic of Korea, 2022; Volume 6, Available online: https://www.kisa.or.kr/20301/form?postSeq=14&page=1&fbclid=IwAR3mpF0tJNxHbChXMTyf8MLNpklCWe1g6wwnmYnxLEExMFlJCbA9Rf76nyg (accessed on 11 December 2024).
- Roussou, I.; Stiakakis, E.; Sifaleras, A. An empirical study on the commercial adoption of digital currencies. Inf. Syst. e-Bus. Manag 2019, 17, 223–259. [Google Scholar] [CrossRef]
- ISO/IEC 15408. Available online: http://commoncriteriaportal.org (accessed on 11 December 2024).
- NIST CMVP. Available online: http://csrc.nist.gov/projects/cryptographic-module-validation-program (accessed on 11 December 2024).
- Lee, K.; Won, D.; Kim, S. Analyzing the TPM-related evaluation and certification programs for improving the reliability and safety of smart meters. J. Korea Inst. Inf. Secur. Cryptol. 2010, 20, 48–55. [Google Scholar]
- Sabt, M.; Achemlal, M.; Bouabdallah, A. Trusted Execution Environment: What It is, and What It is Not. In 2015 IEEE Trustcom/BigDataSE/ISPA; IEEE: Helsinki, Finland, 2015; pp. 57–64. [Google Scholar] [CrossRef]
- Lampayan, F. How to Setup TPM-Simulator in Ubuntu 20.04. Available online: https://francislampayan.medium.com/how-to-setup-tpm-simulator-in-ubuntu-20-04-25ec673b88dc (accessed on 11 December 2024).
Model Name | Key Features | Type |
---|---|---|
Stripe [14,15] | The client receives a secret from the server and sends it to the Stripe server to process the payment. The legitimacy of the payment is verified once the terminal is online | Hybrid |
UPI lite [16,17] | Payment instructions are issued offline, but the verification takes place once the terminal is online | Hybrid |
Matera [18] | Payment instructions are issued offline, but the payee needs to be online | Hybrid |
Crunchfish’s digital cash [19,20] | Payment instructions are securely generated using V-key and V-OS VSE. Merchants can store payment information and synchronize offline payments once connected to the internet | Hybrid |
OPERA [21] | Offline payments are facilitated using one-time readable memory, digital signature, and a token counter | Complete offline |
Private Claims | Meaning |
---|---|
“cbSta” | Status of offline CBDC token the values of which are “Tp “, “ON”. Tp: temporary token, ON: made in the offline but not yet confirmed in the online. Where “N” is the number of generations of the offline CBDC token. Especially, “O1” is the first offline token generated from online. |
“cbRt” | Transaction number (RT) of the Offline CBDC. |
“cbOwn” | Owner ID of Token. Owner ID should be the subject name in the ID certificate. |
“cbOtcn” | TPM counter number of the Owner offline CBDC wallet. |
“cbAmt” | Transaction amount |
“cbEds” | Endorser ID of Token. Endorser ID should be the subject name in the ID certificate. |
“cbEtcn” | TPM counter number of the Endorser offline CBDC wallet. |
Category | OPERA Model | Proposed Model |
---|---|---|
Key features | * - The distribution of pre-generated tokens with a predetermined value by a financial institution, similarly to the issuance of coins. * - It is necessary to assemble a minimum combination of tokens that corresponds to the transaction amount and subsequently deliver it to the designated recipient. | * - All valid input tokens are categorized into two distinct output tokens: the sending token and the holding token. * - The tokens employed are organized in a token chain. |
Security Mechanisms | * - A secure hardware wallet is utilized for the authentication and management of tokens, as well as for the storage of critical information, including encryption keys within a TPM. * - Specific hardware, characterized as one-time readable memory, is employed to safeguard against the reuse of tokens. * - The counter serves to indicate the number of tokens and is utilized for the purpose of transaction verification. | * - The use of a software wallet is essential for the management of tokens, as it securely stores key information, including the encryption key, within a TPM. * - A valid signature message is attached to all tokens. * - A monotonic counter is utilized to track the utilization of the token in prior instances. |
Offline Digital Currency Threats | Proposed Model |
---|---|
Token forgery and non-repudiation | - Token is backed by guarantor’s signature (also prevents fraud by owners) - TPM is accessible only to authorized OffCW and the digital signature key is not exposed to the outside of TPM |
Digital wallet breach | - Critical information (e.g., encryption key SRKX) is inside the TPM and most of the information is stored encrypted - Some security countermeasures are more necessary, such as TEE, secure coding, limiting the amount of token held, and limiting the number of token exchanges |
Double spending | - The TPM monotonic counter that changes with each transaction to prevent double spending |
Verifiability | - Token has the signature with ID certificate - To create a new token, existing valid tokens are required |
Anonymity | - The ID certificate (OffCW ID) is applied in this model. The ID is an administrative code by CBDC institution, similar to the serial number on a banknote |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yoon, J.; Kim, Y. Offline Payment of Central Bank Digital Currency Based on a Trusted Platform Module. J. Cybersecur. Priv. 2025, 5, 14. https://doi.org/10.3390/jcp5020014
Yoon J, Kim Y. Offline Payment of Central Bank Digital Currency Based on a Trusted Platform Module. Journal of Cybersecurity and Privacy. 2025; 5(2):14. https://doi.org/10.3390/jcp5020014
Chicago/Turabian StyleYoon, Jaeho, and Yongmin Kim. 2025. "Offline Payment of Central Bank Digital Currency Based on a Trusted Platform Module" Journal of Cybersecurity and Privacy 5, no. 2: 14. https://doi.org/10.3390/jcp5020014
APA StyleYoon, J., & Kim, Y. (2025). Offline Payment of Central Bank Digital Currency Based on a Trusted Platform Module. Journal of Cybersecurity and Privacy, 5(2), 14. https://doi.org/10.3390/jcp5020014