merge more improvements from Dora

This commit is contained in:
Christian Grothoff 2022-02-06 12:33:49 +01:00
parent 34a7f59060
commit cfa1283053
No known key found for this signature in database
GPG Key ID: 939E6BE1E29FC3CC
4 changed files with 1473 additions and 92 deletions

@ -1 +1 @@
Subproject commit 3a71278a2aab67f9a1888af172b507d6e08364cf
Subproject commit c12314df0f82e192c6829a9c6cf3e9663b586da1

1375
doc/cbdc-it/agsm-mod.bst Normal file

File diff suppressed because it is too large Load Diff

View File

@ -1,7 +1,9 @@
%% To be used with modified bibliography style agsm-mod + hyperref + natbib + italian babel
@article{Adrian,
author = {Adrian, Tobias and Mancini-Griffoli},
year = {2019},
title = {The Rise of Digital Money},
title = {{The Rise of Digital Money}},
journal = {IMF Fintech Note},
volume = {19/01},
}
@ -9,7 +11,7 @@
@article{Agarwal,
author = {Agarwal, Ruchir and Miles S. Kimball},
year = {2019},
title = {Enabling Deep Negative Rates to Fight Recessions: A Guide},
title = {{Enabling Deep Negative Rates to Fight Recessions: A Guide}},
journal = {IMF Working Paper},
volume = {19/84},
}
@ -18,7 +20,7 @@
@article{Agur,
author = {Agur, Itai and Anil Ari and Giovanni Dell'Ariccia},
year = {2019},
title = {Designing Central Bank Digital Currencies},
title = {{Designing Central Bank Digital Currencies}},
journal = {IMF Working Paper},
volume = {19/252},
}
@ -26,7 +28,7 @@
@article{Allen,
author = {Allen, Sarah and Srđjan Čapkun and Ittay Eyal and Giulia Fanti and Bryan A. Ford and James Grimmelmann and Ari Juels and Kari Kostiainen and Sarah Meiklejohn and Andrew Miller and Eswar Prasad and Karl Wüst and Fan Zhang},
year = {2020},
title = {Design Choices for Central Bank Digital Currency: Policy and Technical Considerations},
title = {{Design Choices for Central Bank Digital Currency: Policy and Technical Considerations}},
journal = {NBER Working Paper},
volume = {27634},
}
@ -35,7 +37,7 @@
author = {Alves, Tiago and Don Felton},
year = {2004},
title = {TrustZone: Integrated hardware and software security},
journal = {\textit{ARM IQ}},
journal = {ARM IQ},
volume = {3},
number = {4},
pages = {18--24},
@ -45,7 +47,7 @@
author = {Auer, Raphael and Rainer Böhme},
year = {2020},
title = {The technology of retail central bank digital currency},
journal = {\textit{BIS Quarterly Review}},
journal = {BIS Quarterly Review},
month = {March},
pages = {85--96},
}
@ -53,8 +55,8 @@
@article{AuerCornelli,
author = {Auer, Raphael and Giulio Cornelli and Jon Frost},
year = {2020},
title = {Taking stock: ongoing retail {CBDC} projects},
journal = {\textit{BIS Quarterly Review}},
title = {{Taking stock: ongoing retail CBDC projects}},
journal = {BIS Quarterly Review},
month = {March},
pages = {97--98},
}
@ -62,21 +64,21 @@
@booklet{BIS,
author = {{Bank for International Settlements}},
year = {2018},
title = {Central Bank Digital Currencies. Joint Report of the Committee on Payments and Market Infrastructures and Markets Committee},
title = {{Central Bank Digital Currencies. Joint Report of the Committee on Payments and Market Infrastructures and Markets Committee}},
}
@booklet{BoE,
author = {{Bank of England}},
year = {2020},
title = {Central Bank Digital Currency: Opportunities, Challenges and Design. Discussion Paper},
title = {{Central Bank Digital Currency: Opportunities, Challenges and Design. Discussion Paper}},
month = {March},
}
@article{Baiocchi,
author = {Baiocchi, Giovanni and Walter Distaso},
year = {2003},
title = {{GRETL}: Econometric Software for the {GNU} Generation},
journal = {\textit{Journal of Applied Econometrics}},
title = {{GRETL: Econometric Software for the GNU Generation}},
journal = {Journal of Applied Econometrics},
volume = {18},
pages = {105-110},
}
@ -85,7 +87,7 @@
author = {Bech, Morten and Rodney Garratt},
year = {2017},
title = {Central bank cryptocurrencies},
journal = {\textit{BIS Quarterly Review}},
journal = {BIS Quarterly Review},
month = {September},
pages = {55--70},
}
@ -93,8 +95,8 @@
@article{Berentsen,
author = {Berentsen, Aleksander and Fabian Schär},
year = {2018},
title = {The Case for Central Bank Electronic Money and the Non-case for Central Bank Cryptocurrencies},
journal = {\textit{Federal Reserve Bank of St. Louis Review}},
title = {{The Case for Central Bank Electronic Money and the Non-case for Central Bank Cryptocurrencies}},
journal = {Federal Reserve Bank of St. Louis Review},
volume = {100},
number = {2},
pages = {97--106},
@ -103,15 +105,15 @@
@article{Bernstein2020,
author = {Bernstein, Daniel J. and Tanja Lange},
year = {2020},
title = {{eBACS}: {ECRYPT} Benchmarking of Cryptographic Systems},
url = {\url{https://bench.cr.yp.to}, accessed 17 March 2020},
title = {{eBACS: ECRYPT Benchmarking of Cryptographic Systems}},
url = {\url{https://bench.cr.yp.to}, consultato il 17 marzo 2020},
}
@article{Bernstein2012,
author = {Bernstein, Daniel J. and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Yang},
year = {2012},
title = {High-speed high-security signatures},
journal = {\textit{Journal of Cryptographic Engineering}},
journal = {Journal of Cryptographic Engineering},
volume = {2},
pages = {77--89},
}
@ -119,7 +121,7 @@
@InCollection{Bindseil,
author = {Bindseil, Ulrich},
year = {2020},
title = {Tiered {CBDC} and the financial system},
title = {{Tiered CBDC and the financial system}},
publisher = {European Central Bank},
series = {ECB Working Paper},
number = {2351},
@ -137,8 +139,8 @@
@article{Boneh,
author = {Boneh, Dan},
year = {1999},
title = {Twenty Years of Attacks on the {RSA} Cryptosystem},
journal = {\textit{Notices of the AMS}},
title = {{Twenty Years of Attacks on the RSA Cryptosystem}},
journal = {Notices of the AMS},
volume = {42},
number = {2},
pages = {202--213},
@ -156,8 +158,8 @@
@article{Brunnermeier,
author = {Brunnermeier, Markus and Dirk Niepelt},
year = {2019},
title = {On the Equivalence of Private and Public Money},
journal = {\textit{Journal of Monetary Economics}},
title = {{On the Equivalence of Private and Public Money}},
journal = {Journal of Monetary Economics},
volume = {106},
pages = {27--41},
}
@ -165,8 +167,8 @@
@article{Buiter,
author = {Buiter, Willem H. and Nikolaos Panigirtzoglou},
year = {2003},
title = {Overcoming the Zero Bound on Nominal Interest Rates with Negative Interest on Currency: Gesell's Solution},
journal = {\textit{The Economic Journal}},
title = {{Overcoming the Zero Bound on Nominal Interest Rates with Negative Interest on Currency: Gesell's Solution}},
journal = {The Economic Journal},
volume = {113},
number = {490},
pages = {723--746},
@ -184,7 +186,7 @@
@inproceedings{Camenisch2007,
author = {Camenisch, Jan and Aanna Lysyanskaya and Mira Meyerovich},
year = {2007},
title = {Endorsed E-Cash},
title = {{Endorsed E-Cash}},
booktitle = {\textit{2007 IEEE Symposium on Security and Privacy (SP'07)}},
month = {May},
pages = {101--115},
@ -193,7 +195,7 @@
@inproceedings{Camenisch2005,
author = {Camenisch, Jan and Susan Hohenberger and Anna Lysyanskaya},
year = {2005},
title = {Compact E-Cash},
title = {{Compact E-Cash}},
booktitle = {\textit{Advances in Cryptology -- EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques}},
address = {Aarhus, Denmark},
month = {May},
@ -215,15 +217,15 @@
@misc{CCC,
author = {{CCC e.V.}},
year = {2017},
title = {Chaos Computer Club hacks e-motor charging stations},
title = {{Chaos Computer Club hacks e-motor charging stations}},
howpublished = {34c3},
}
@article{Chapman,
author = {Chapman, James and Rodney Garratt and Scott Hendry and Andrew McCormack and Wade McMahon},
year = {2017},
title = {Project {J}asper: Are Distributed Wholesale Payment Systems Feasible Yet?},
journal = {\textit{Financial System Review}},
title = {{Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet?}},
journal = {Financial System Review},
publisher = {Bank of Canada},
month = {June},
pages = {59--69},
@ -248,7 +250,7 @@
@inproceedings{Danezis,
author = {Danezis, George and Sarah Meiklejohn},
year = {2016},
title = {Centrally Banked Cryptocurrencies},
title = {{Centrally Banked Cryptocurrencies}},
booktitle = {\textit{23nd Annual Network and Distributed System Security Symposium, NDSS2016}},
address = {San Diego, California, USA},
month = {February},
@ -259,7 +261,7 @@
@article{Diffie,
author = {Diffie, Whitfield and Martin Hellmann},
year = {1976},
title = {New Directions in Cryptography},
title = {{New Directions in Cryptography}},
journal = {IEEE Trans. on Inf. Theory, IT-22},
pages = {644--654},
}
@ -267,7 +269,7 @@
@phdthesis{Dold,
author = {Dold, Florian},
year = {2019},
title = {The {GNU} {T}aler System: Practical and Provably Secure Electronic Payments. PhD Thesis},
title = {{The GNU Taler System: Practical and Provably Secure Electronic Payments. PhD Thesis}},
school = {University of Rennes 1},
}
@ -275,7 +277,7 @@
author = {{European Central Bank}},
year = {2019},
title = {Exploring anonymity in central bank digital currencies},
journal = {\textit{In Focus}},
journal = {In Focus},
number = {4},
month = {December},
}
@ -284,7 +286,7 @@
author = {Fuchsbauer, Georg and David Pointcheval and Damien Vergnaud},
year = {2009},
title = {Transferable constant-size fair e-cash},
booktitle = {\textit{International Conference on Cryptology and Network Security}},
booktitle = {International Conference on Cryptology and Network Security},
publisher = {Springer-Verlag Berlin Heidelberg},
pages = {226--247},
}
@ -292,15 +294,15 @@
@inproceedings{Garcia,
author = {Garcia, Flavio and Gerhard de Koning Gans and Ruben Muijrers and Peter van Rossum and Roel Verdult and Ronny Wichers Schreur and Bart Jacobs},
year = {2008},
title = {Dismantling MIFARE Classic},
title = {{Dismantling MIFARE Classic}},
booktitle = {\textit{European Symposium on Research in Computer Security}},
}
@article{Garratt,
author = {Garratt, Rod and Michael Lee and Brendan Malone and Antoine Martin},
year = {2020},
title = {Token- or Account-Based? A Digital Currency Can Be Both},
journal = {\textit{Liberty Street Economics}},
title = {{Token- or Account-Based? A Digital Currency Can Be Both}},
journal = {Liberty Street Economics},
publisher = {Federal Reserve Bank of New York},
month = {August},
day = {12},
@ -309,8 +311,8 @@
@article{Goodfriend,
author = {Goodfriend, Marvin},
year = {2000},
title = {Overcoming the Zero Bound on Interest Rate Policy},
journal = {\textit{Journal of Money, Credit, and Banking}},
title = {{Overcoming the Zero Bound on Interest Rate Policy}},
journal = {Journal of Money, Credit, and Banking},
volume = {32},
number = {4},
pages = {1007--1035},
@ -320,7 +322,7 @@
author = {Johnston, Casey},
year = {2010},
title = {PS3 hacked through poor cryptography implementation},
journal = {\textit{Ars Technica}},
journal = {Ars Technica},
month = {December},
day = {30},
}
@ -338,8 +340,8 @@
@article{Kahn2009,
author = {Kahn, Charles M. and William Roberds},
year = {2009},
title = {Why Pay? An Introduction to Payments Economics},
journal = {\textit{Journal of Financial Intermediation}},
title = {{Why Pay? An Introduction to Payments Economics}},
journal = {Journal of Financial Intermediation},
number = {18},
pages = {1--23},
}
@ -347,8 +349,8 @@
@article{Kahn2005,
author = {Kahn, Charles M. and James McAndrews and William Roberds},
year = {2005},
title = {Money is Privacy},
journal = {\textit{International Economic Review}},
title = {{Money is Privacy}},
journal = {International Economic Review},
volume = {46},
number = {2},
pages = {377--399},
@ -358,7 +360,7 @@
author = {Kasper, Timo and Michael Silbermann and Christof Paar},
year = {2010},
title = {All you can eat or breaking a real-world contactless payment system},
journal = {\textit{Financial Cryptography and Data Security, Lecture Notes in Computer Science}},
journal = {Financial Cryptography and Data Security, Lecture Notes in Computer Science},
volume = {6052},
pages = {343--50},
}
@ -366,7 +368,7 @@
@inproceedings{Katzenbeisser,
author = {Katzenbeisser, Stefan and Ünal Kocabaş and Vladimir Rožić and Ahmad-Reza Sadeghi and Ingrid Verbauwhede and Christian Wachsmann},
year = {2012},
title = {{PUF}s: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions ({PUF}s) Cast in Silicon},
title = {{PUFs: Myth, Fact or Busted? A Security Evaluation of Physically Unclonable Functions (PUFs) Cast in Silicon}},
booktitle = {\textit{Cryptographic Hardware and Embedded Systems -- CHES 2012. Lecture Notes in Computer Science}},
volume = {7428},
pages = {283--301},
@ -382,7 +384,7 @@
@article{Kiff,
author = {Kiff, John and Jihad Alwazir and Sonja Davidovic and Aquiles Farias and Ashraf Khan and Tanai Khiaonarong and Majid Malaika and Hunter Monroe and Nobu Sugimoto and Hervé Tourpe and Peter Zhou},
year = {2020},
title = {A Survey of Research on Retail Central Bank Digital Currency},
title = {{A Survey of Research on Retail Central Bank Digital Currency}},
journal = {IMF Working Paper},
volume = {20/104},
}
@ -399,7 +401,7 @@
@inproceedings{Lapid,
author = {Lapid, Ben and Avishai Wool},
year = {2018},
title = {Cache-Attacks on the {ARM} TrustZone Implementations of {AES}-256 and {AES}-256-{GCM} via {GPU}-Based Analysis},
title = {{Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis}},
booktitle = {\textit{International Conference on Selected Areas in Cryptography. Lecture Notes in Computer Science}},
volume = {11349},
}
@ -407,14 +409,16 @@
@article{Lerner,
author = {Lerner, Josh and Jean Tirole},
year = {2005},
title = {The Scope of Open Source Licensing},
journal = {\textit{Journal of Law, Economics \& Organization}},
title = {{The Scope of Open Source Licensing}},
journal = {Journal of Law, Economics \& Organization},
volume = {21},
pages = {20-56},
}
@misc{Libra,
author = {{Libra White Paper v2.0}},
author = {{Libra Association}},
year = {2020},
title = {{Libra White Paper v2.0}},
url = {\url{https://libra.org/en-US/white-paper}},
}
@ -429,7 +433,7 @@
@InCollection{Lyons,
author = {Lyons, Richard K. and Ganesh Viswanath-Natraj},
year = {2020},
title = {What Keeps Stablecoins Stable?},
title = {{What Keeps Stablecoins Stable?}},
publisher = {National Bureau of Economic Research},
series = {NBER Working Paper Series},
number = {27136},
@ -439,7 +443,7 @@
@article{Mancini-Griffoli,
author = {Mancini-Griffoli and Maria Soledad Martinez Peria and Itai Agur and Anil Ari and John Kiff and Adina Popescu and Celine Rochon},
year = {2018},
title = {Casting Light on Central Bank Digital Currency},
title = {{Casting Light on Central Bank Digital Currency}},
journal = {IMF Staff Discussion Notes},
volume = {18/08},
publisher = {International Monetary Fund},
@ -448,7 +452,7 @@
@misc{Nakamoto,
author = {Nakamoto, Satoshi},
year = {2008},
title = {Bitcoin: A Peer-to-Peer Electronic Cash System},
title = {{Bitcoin: A Peer-to-Peer Electronic Cash System}},
url = {\url{https://www.bitcoin.com/bitcoin.pdf}},
}
@ -463,14 +467,14 @@
author = {Niepelt, Dirk},
year = {2020},
title = {Digital money and central bank digital currency: An executive summary for policymakers},
url = {https://voxeu.org/article/digital-money-and-central-bank-digital-currency-executive-summary},
howpublished = {\url{https://voxeu.org/article/digital-money-and-central-bank-digital-currency-executive-summary}},
}
@inproceedings{Okamoto,
author = {Okamoto, Tatsuaki},
year = {1995},
title = {An Efficient Divisible Electronic Cash Scheme},
booktitle = {\textit{Advances in Cryptology --- CRYPT0'95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, August 27--31, 1995 Proceedings}},
title = {{An Efficient Divisible Electronic Cash Scheme}},
booktitle = {\textit{Advances in Cryptology --- CRYPT0'95: 15th Annual International Cryptology Conference Santa Barbara, California, USA, 27--31 agosto, 1995 Proceedings}},
editor = {Ed. di Don Coppersmith},
publisher = {Springer-Verlag Berlin Heidelberg},
pages = {438--451},
@ -479,7 +483,7 @@
@article{Pinto,
author = {Pinto, S. and N. Santos},
year = {2019},
title = {Demystifying {ARM} TrustZone: A Comprehensive Survey},
title = {{Demystifying ARM TrustZone: A Comprehensive Survey}},
journal = {ACM Computing Surveys},
volume = {51},
number = {6},
@ -490,8 +494,8 @@
@article{Rivest,
author = {Rivest, Ronald L. and Adi Shamir and Leonard Adleman},
year = {1978},
title = {A Method for Obtaining Digital Signatures and Public Key Cryptosystems},
journal = {\textit{Comm. ACM}},
title = {{A Method for Obtaining Digital Signatures and Public Key Cryptosystems}},
journal = {Comm. ACM},
volume = {21},
number = {2},
}
@ -506,8 +510,8 @@
@article{Soukup,
author = {Soukup, Michael and Bruno Muff},
year = {2007},
title = {Die {P}ostcard lässt sich fälschen},
journal = {\textit{Sonntagszeitung}},
title = {{Die Postcard lässt sich fälschen}},
journal = {Sonntagszeitung},
month = {April},
day = {22},
}
@ -515,8 +519,8 @@
@article{Stallman,
author = {Stallman, Richard},
year = {1985},
title = {The {GNU} manifesto},
journal = {\textit{Dr. Dobb's Journal of Software Tools}},
title = {{The GNU manifesto}},
journal = {Dr. Dobb's Journal of Software Tools},
volume = {10},
number = {3},
pages = {30--35},
@ -525,7 +529,7 @@
@TechReport{Riksbank,
author = {{Sveriges Riksbank}},
year = {2020},
title = {The {R}iksbank's e-krona project},
title = {{The Riksbank's e-krona project}},
month = {February},
institution = {Sveriges Riksbank},
url = {\url{https://www.riksbank.se/globalassets/media/rapporter/e-krona/2019/the-riksbanks-e-krona-pilot.pdf}},
@ -534,15 +538,15 @@
@misc{Wojtczuk,
author = {Wojtczuk, Rafal and Joanna Rutkowska},
year = {2009},
title = {Attacking {I}ntel Trusted Execution Technology},
title = {{Attacking Intel Trusted Execution Technology}},
howpublished = {BlackHat-DC 2009},
}
@article{Yalta2010,
author = {Yalta, A. Talha and A. Yasemin Yalta},
year = {2010},
title = {Should Economists Use Open Source Software for Doing Research?},
journal = {\textit{Computational Economics}},
title = {{Should Economists Use Open Source Software for Doing Research?}},
journal = {Computational Economics},
volume = {35},
pages = {371--394},
}
@ -550,8 +554,8 @@
@article{Yalta2008,
author = {Yalta, A. Talha and Riccardo Lucchetti},
year = {2008},
title = {The {GNU/L}inux Platform and Freedom Respecting Software for Economists},
journal = {\textit{Journal of Applied Econometrics}},
title = {{The GNU/Linux Platform and Freedom Respecting Software for Economists}},
journal = {Journal of Applied Econometrics},
volume = {23},
pages = {279-286},
}

View File

@ -7,7 +7,6 @@
\usepackage{graphicx}
\usepackage{natbib}
\usepackage[italian]{babel}
%\usepackage{babelbib}
\title{Come emettere una moneta digitale di banca centrale}
\author{David Chaum\footnote{david@chaum.com} \\
xx Network \and
@ -20,7 +19,11 @@
Prima versione: maggio 2020}
\addto\captionsitalian{\renewcommand{\figurename}{Diagramma}}
\hyphenation{CBDC,Allen,Ni\-co\-las,Meikle\-john,Nie\-pelt}
\AtBeginDocument{\renewcommand{\harvardand}{\&}}
\hyphenation{CBDC}
\hyphenation{Allen}
\hyphenation{Meiklejohn}
\hyphenation{Nicolas}
\begin{document}
@ -292,7 +295,7 @@ tassonomia delle \textit{stablecoin}, si veda~\cite{Bullmann}.}
Le «\textit{stablecoin} algoritmiche» si basano su algoritmi per regolare
l'offerta della moneta. In altre parole, cercano di stabilizzarne il
prezzo attraverso una «politica monetaria algoritmica». Esistono
esempi di tali \textit{stablecoin} (per es. Nubits), ma finora nessuna è
esempi di tali \textit{stablecoin} (per esempio, Nubits), ma finora nessuna è
riuscita a stabilizzare il proprio valore per molto tempo.
Le \textit{stablecoin} «ancorate ad attivi» differiscono in base al tipo
@ -303,7 +306,7 @@ l'oro), titoli e talvolta altre criptovalute. La capacità di un tale
schema di stabilizzare il valore della moneta rispetto agli attivi
sottostanti dipende in modo cruciale dai diritti legali acquisiti dai
detentori della moneta. Se una \textit{stablecoin} è riscattabile ad un
prezzo fisso (ad esempio, 1 moneta = 1 USD o 1 moneta = 1 oncia d'oro),
prezzo fisso (ad esempio, \\ 1 moneta = 1 USD o 1 moneta = 1 oncia d'oro),
la stabilità si può teoricamente ottenere.\footnote{Se possa stabilizzare
il valore della \textit{stablecoin} anche rispetto ai beni e servizi
scambiati dipende essenzialmente da quanto sia stabile il valore degli
@ -348,7 +351,7 @@ controparte, ovvero al rischio di fallimento dell'emittente.
Se una \textit{stablecoin} non è rimborsabile ad un prezzo fisso, la sua
stabilità rispetto all'attivo sottostante non è garantita. Se la
\textit{stablecoin} rappresenta comunque una quota di proprietà
\textit{stablecoin} rappresenta \\ comunque una quota di proprietà
dell'attivo sottostante, lo schema ricorda quello di un fondo comune di
investimento chiuso o di un fondo indicizzato quotato (\textit{Exchange-Traded
Fund} - ETF) e si applicano i relativi rischi. Il valore
@ -370,7 +373,7 @@ centrale. Due modelli possibili che si trovano nella letteratura
sull'argomento sono (a) CBDC basata su conti e (b) CBDC basata su
token (o sul valore). Questi modelli corrispondono ai due tipi
esistenti di moneta delle banche centrali e ai relativi sistemi di
pagamento (Kahn e Roberds 2008): riserve delle banche centrali
pagamento~\cite{Kahn2009}: riserve delle banche centrali
(sistema basato su conti) e banconote (sistema basato su token). Un
pagamento si verifica quando un'attivo monetario viene trasferito da un
pagatore a un beneficiario. In un sistema basato su conti, il
@ -458,7 +461,7 @@ sostengono che i trasferimenti di fondi dai depositi ai conti
CBDC porterebbero alla sostituzione automatica del finanziamento
mediante depositi con il finanziamento tramite la banca centrale, il
che andrebbe ad esplicitare la garanzia finora implicita di prestatore
di ultima istanza delle banche centrali. \cite{Berentsen}
di ultima istanza delle banche centrali. \\ \cite{Berentsen}
sostengono che la concorrenza delle banche centrali potrebbe persino
avere un effetto disciplinare sulle banche commerciali e quindi
aumentare la stabilità del sistema finanziario, dato che queste ultime
@ -466,9 +469,9 @@ sarebbero costrette a consolidare la sicurezza dei propri modelli
economici per eviatare corse agli sportelli.
% References to Kumhof, Bindseil below should render like this:
% valore (Kumhof & Noone, 2018 e Bindseil, 2020).
% valore (Kumhof & Noone, 2018 e Bindseil, 2020).
% This was fixed by replacing "," with "and" to separate authors in the bib file.
% It also fixed {Kumhof} to render as "Kumhof & Noone".
% It also fixed {Kumhof} to render as "Kumhof & Noone".
Esistono anche proposte per ridurre il rischio di disintermediazione
restringendo o scoraggiando l'uso della CBDC come riserva di valore. Una
@ -492,7 +495,7 @@ problematiche.
\label{cbdc-basata-su-token-e-legata-al-hardware}
% References to Wojtczuk,Johnston,Lapid below do not render correctly in pdf. Should be:
% compromesse (si veda, ad esempio, Wojtczuk & Rutkowska 2009, Johnston 2010 e Lapid & Wool 2018).
% compromesse (si veda, ad esempio, Wojtczuk & Rutkowska 2009, Johnston 2010 e Lapid & Wool 2018).
% but we can only either use "," or "e", but not switch AFAIK.
% This was fixed by replacing "," with "and" to separate authors in the bib file.
% It also fixed {Katzenbeisser} to render as "Katzenbeisser et al."
@ -521,7 +524,7 @@ finanziamento del terrorismo renderebbe difficile la lotta alla
criminalità.
% References to Soukup,Garcia,Kasper,CCC below do not render correctly in pdf. Should be:
% Lesperienza (si veda, ad esempio, Soukup & Muff 2007, Garcia et al. 2008, Kasper et al. 2010 e CCC e.V. 2017) suggerisce
% Lesperienza (si veda, ad esempio, Soukup & Muff 2007, Garcia et al. 2008, Kasper et al. 2010 e CCC e.V. 2017) suggerisce
% but we can only either use "," or "e", but not switch AFAIK.
% This was fixed by replacing "," with "and" to separate authors in the bib file.
@ -542,7 +545,7 @@ Tuttavia, il rilevamento delle frodi richiede la capacità di identificare
i pagatori e tenere traccia dei clienti, il che non è compatibile con la
privacy nelle transazioni.
\section{Una CBDC basata su token progettata per tutelare la privacy}
\section{Una CBDC basata su token progettata per \\ tutelare la privacy}
\label{4.-una-cbdc-basata-su-token-progettata-per-tutelare-la-privacy}
La CBDC qui proposta è di tipo «solo software», semplicemente
@ -872,7 +875,7 @@ un uso futuro con il protocollo di scambio di chiavi
Sia $C_{i}$ la chiave pubblica corrispondente a $c_{i}$.
Il cliente chiede quindi alla banca centrale di creare una firma cieca su
$C_{i}$ per $i \in \{ 1,\ldots,\kappa\}$.\footnote{Se dovesse essere
utilizzato il crittosistema RSA per le firme cieche, useremmo
utilizzato il crittosistema RSA per le firme cieche, useremmo \\
$f \equiv \emph{FDH}_{n}(C_{i})$, dove
$\emph{FDH}_{n}()$
è l'hash del dominio completo sul dominio $n$.} In questa richiesta, il
@ -1090,7 +1093,7 @@ principale è rappresentato dall'archiviazione sicura per
molti anni di 110 kilobyte per transazione. Gli esperimenti su un
prototipo di GNU Taler che utilizzava i prezzi di \textit{Amazon Web Service}
hanno stabilito che il costo del sistema (archiviazione, larghezza di
banda e capacità di calcolo) su larga scala sarebbe inferiore a
banda e capacità di calcolo) su larga scala sarebbe inferiore a \\
0,0001 USD per transazione~\cite[per i dettagli sui dati, si veda][]{Dold}.
\section{Considerazioni normative e politiche}
@ -1115,8 +1118,8 @@ contratti relativi ai pagamenti sospetti al fine di verificarne la
legittimità. La trasparenza del reddito risultante è anche una forte
misura contro l'evasione fiscale perché i venditori non possono
sottodichiarare il proprio reddito o evadere le tasse sulle vendite.
Nel complesso, il sistema implementa gli approcci \textit{privacy-by-
design} e \textit{privacy-by-default} (come richiesto, ad esempio,
Nel complesso, il sistema implementa gli approcci~\textit{privacy-by-design}
e \textit{privacy-by-default} (come richiesto, ad esempio,
dal Regolamento generale sulla protezione dei dati dell'UE, GDPR). I
venditori non apprendono necessariamente l'identità dei propri clienti,
le banche possiedono solo le informazioni necessarie sulle attività dei
@ -1151,7 +1154,7 @@ ci aspettiamo un accaparramento significativamente maggiore rispetto a
quello del denaro fisico.
Tuttavia, se l'accumulo o la massiccia conversione dei depositi
bancari in CBDC dovessero destare proccupazione, la banca centrale
bancari in CBDC dovessero destare preoccupazione, la banca centrale
avrebbe diverse opzioni. Come si è spiegato, secondo il progetto
proposto le banche centrali fissano una data di scadenza per tutte le
chiavi di firma, il che implica che in una data prestabilita le monete
@ -1217,7 +1220,7 @@ clienti che la trasparenza del reddito, fornendo al contempo un sistema
di resto efficiente, scambi atomici~\cite[vedi][]{Camenisch2007} e la
possibilità di ripristinare i portafogli dal backup.
Per quanto riguarda i sistemi di pagamento per le CBDC, \cite{Danezis}
Per quanto riguarda i sistemi di pagamento per le CBDC,~\cite{Danezis}
hanno progettato un \textit{ledger} scalabile per RSCoin. Si tratta
fondamentalmente di un sistema RTGS che viene protetto utilizzando la
stessa crittografia che si usa in Bitcoin. Come Taler, il design utilizza
@ -1295,7 +1298,6 @@ alla loro politica monetaria e alla stabilità finanziaria sfruttando al
contempo i vantaggi del passaggio al digitale.
\newpage
\bibliographystyle{agsm}
\bibliographystyle{agsm-mod}
\bibliography{cbdc-it}
\end{document}