Theoretical background: The beginning of the third decade of the 21st century brought a dynamic development of new technologies, intensifying the ongoing process of digitalization of the global economy. Among these changes, one of the undoubtedly noticeable areas that are developed both on theoretical and practical grounds is the central bank digital currency (CBDC). It is a new – different from cash – currency issued by the monetary authorities, considered as a response to the development of private virtual currencies, which is aimed at the same time to improve the circulation of money. An increasing number of central banks are considering issuing their own CBDC. According to the BIS studies, in 2021 nine out of ten central banks actively research implementation of a digital currency. This number is constantly growing. More and more monetary authorities are at an advanced stage of CBDC work, 26% of central banks already running pilot tests (compared to only 8% in 2018). Purpose of the article: The main aim of the article is to identify barriers to the central bank digital currency introduction as well the case study analysis of the current involvement of selected central banks in the process of its implementation. Research methods: The main research method used in the conducted empirical research is the case study analysis of selected central banks that have undertaken works on the CBDC implementation. The research verifies the main hypothesis that despite growing involvement of central banks in the work for the issue of CBDC, its barriers and limitations are large enough to inhibit practical implementation. Main findings: The results indicated that such barriers as limited validity period, lack of anonymity and full control of a central bank over its use may significantly limit further monetary authorities’ work on its implementation.
2
Dostęp do pełnego tekstu na zewnętrznej witrynie WWW
W artykule przedstawiono propozycje protokołu płatności w sieciach bezprzewodowych. Protokól zakłada dwie techniki realizacji transakcj i: w trybie on-line z udziałem zaufanej strony - dla tzw. makropłatności oraz w trybie off-line przy użyciu elektronicznego pieniądza, głównie dla transakcji o małym nominale - tzw. mikropłatności. Omówiono scenariusze różnych zdarzeń i transakcji w protokole. Zwrócono uwagę na aspekty bezpieczeństwa płatności uwzględniając techniki kryptografii asymetrycznej i infrastruktury kluczy publicznych. Dla oceny protokołu wykonano testy, w których uwzględniono kryteria charakterystyczne dla środowiska bezprzewodowego.
EN
The article proposes a payment protocol in wireless network. The protocol assumes two techniques of transaction realisation with the division between on-line payments with a trust third party - for macropayments and transactions in the off-line mode with the use of electronic money, mainly for transactions of small denomination - the so-called micropayments. Various events and transactions in the protocol as well as the scope of information and annoucements required for them are presented. An asymmetric cryptography and a public key infrastructure are exploited to provide payment security. In order to define quality of the protocol under regard of the characteristic criteria for a wireless environment were carried out its examinations. Usefulness of the payment protocol was evaluated using various measures. The best system has to demon-strate friendly properties for its users. An introduced model fulfils these expectations by delivering possibility of transactions of large amounts as well as of micropayments. Thanks to the use of digital cash transfer a user gets confidentiality. This makes the procedure simpler and a user does not absorb processor on a card through complicated and time-consuming cryptographic procedures. One of the objectives in designing the protocol was to minimize quantity of data exchanged to meet requirements of wireless networks. Due to this a user can execute payment operations in a fast and cheap way. The desired properties of encryption and decryption are obtained by applying the elliptic curves cryptography (ECC). It was confirmed by researches and tests and why it one was used in our protocol.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.