2. What Do We Actually Mean by Money?
In the words of leading money sociologist
Dodd (
2014), “money is an extraordinarily powerful idea”. Yet, a precise and universally agreed-upon definition of the term “money” is not easy to find.
The concept of money is commonly accepted by economic historians as the agreed-upon medium of exchange that resolved the issue of “want of coincidence” in the barter economy, as described in the classic work by
Jevons (
1875): barter works if you can find a supplier of what you want, willing to take what you have in exchange for it. Money comes along to provide a solution to this problem and to offer a more flexible instrument to facilitate exchange and, more generally, commerce. Since not all trade will be simultaneous (which it would have to be in the case of barter), parties who use money will naturally want it to
preserve its value over time. Then, to work out if all these asynchronous exchanges are working well or not, participants will sum and subtract amounts as they trade, counting profit or loss in units of money.
In other words, as summarised by a recent report by the
US Federal Reserve (
2022), money has three broadly-recognised key functions, namely those of providing a
Medium of exchange;
Store of value;
Unit of account.
Starting from the foundational work by
Menger (
1892), various properties of money have been proposed as necessary, including for example durability (resistance to repeated use) and portability (ease of transport). But, while important for cash intended as physical money, in the context of
digital cash these properties can be taken for granted. Other characteristics then emerge, like the following, identified in a report by the
European Central Bank (
2020):
Secure and resistant to cyber-attacks;
Maintainable, because programmed using best-practice software design principles;
Supportive of end-user privacy;
Interoperable with other digital ecosystems; and
Sustainable, in the sense of not requiring large amounts of energy to be processed.
Since the 1980s, starting with Chaum’s pioneering inventions including mix networks (
D. L. Chaum, 1981), blind signatures (
D. Chaum, 1983) and multiple-spending detection (
D. Chaum et al., 1990), various attempts have been made at providing some form of non-physical cash that could be transferred digitally while retaining some of the key properties of cash, such as anonymity, divisibility and unforgeability, some of which do not easily apply to a string of bits. But it is only with the emergence of Bitcoin (
Nakamoto, 2008) that digital cash reached the mainstream, with Central Bank Digital Currencies playing catch-up.
Cash is a form of money, such as coins or banknotes, generally issued locally by a central authority and commonly used for trade within a given geopolitical realm. The most common example are the central bank coins and banknotes that we all use. They are a form of fiat money created by government decree and not backed by real assets—as opposed to money backed by gold, rare nowadays but commonplace in several major economies during the first part of the Twentieth Century.
2The terms “money”, “cash” and “currency” are often used interchangeably in casual speech. Although it is difficult to find authoritative and universally accepted definitions for these terms, “money” is the most general term, encompassing both of the others. It refers, as we said, to any entity used as medium of exchange, unit of account and store of value.
3 The terms “currency” and “cash”, instead, denote money issued by a central bank: both terms refer to the physical coins and banknotes, while only “currency” is used to refer to the specific flavour of money issued by a particular central bank (e.g., USD vs EUR vs CNY). As for non-physical forms of the money issued by a central bank, such as bank account balances, things get murky: bankers tend to consider them currency (it’s still USD or EUR or CNY in the account, after all), but not cash; while, confusingly, accountants tend to consider them cash, but not currency.
We won’t participate in this terminological debate. For the purpose of this paper we will refer to both decentralised cryptocurrencies and centralised CBDCs as
digital cash. The main distinguisher between the digital cash we talk about and the (already widespread, pre-CBDC, yet digitally transferrable) money held in accounts at retail banks is, to us, that digital cash can be transferred between end-users without involving a third party
4 in the transaction. As noted by the
European Central Bank (
2020), this can be implemented
in two ways: either via distributed ledger technology (DLT) protocols or by means of local storage (e.g., using prepaid cards and mobile phone functionality, including in offline payments). […] this solution presents challenges with regard to compliance with AML/CFT
5 rules.
As we mentioned in the introduction, digital cash might also be programmable: e-coins that get paid automatically to a designated beneficiary when certain conditions are met. This feature is a formidable addition, because a programmable digital currency can alter its state (in terms, for example, of its persistence or wallet location) conditionally on specific events. The immediate consequence of this is that, unlike its non-programmable relative which is entirely passive, a programmable digital currency is sentient and reacts to its environment.
3. Requirements Engineering: What’s Hard About Expiring Digital
Cash?
In this section we describe the problem of expiring digital cash. Who might want digital cash? Why is it hard to implement, and why is it interesting? What are its inherent and seemingly paradoxical contradictions? What properties does expiring digital cash need to have, in order to prevent fraud and unintended behaviour?
First of all: why? A plausible motivation for implementing expiry mechanisms in digital cash, from the viewpoint of a central bank, is to support specific macroeconomic or social policy objectives such as stimulating short-term consumption and preventing hoarding of distributed aid. In 1958,
Gesell (
1958) proposed a model for market socialism in which money depreciated over time in order to discourage hoarding and stimulate economic activity. In 1969, future Nobel laureate
Friedman (
1969) suggested “helicopter money”, a kind of monetary stimulus in which the nation’s money supply is increased by directly financing tax cuts or public expenditure (as if free money were dropped from a helicopter) rather than by the central bank buying government bonds. If we were to give Friedman’s helicopter money an expiration date, recipients would not be able to hoard it. Indeed, as reported by
Kan et al. (
2017), in 2009 a fiscal stimulus program in Taiwan distributed 2.57 billion USD in the form of expiring shopping vouchers—and the use of vouchers as opposed to plain cash introduced the additional constraint of limiting what the aid money could be spent on.
For the 2020 Shenzhen digital yuan pilot described in
Section 4.1, the
People’s Bank of China (
2022) stated that one of the objectives was to “meet the demand for retail payment services in the digital economy” and to “improve the efficiency of the currency and payment system”. The white paper from the
People’s Bank of China (
2021) explains that the e-CNY is intended to “carry out pilot programs in a steady, safe, and orderly manner”. In other words, one of the reasons for putting an expiration date on the digital cash used in that particular experiment was to
limit the duration of that early live trial of the e-CNY CBDC. However, another official press release from the
State Council of the People’s Republic of China (
2020) also said that the trial was intended to stimulate consumption and boost domestic demand during the COVID-19 recovery period—thus it was also intended as a small-scale stimulus.
In 2024,
Kahn et al. (
2024) proposed a different motivation for expiring digital cash—namely, expiration as a robustness feature for
offline CBDCs. In such a context, in order to prevent double-spending without the recipient being able to go online to check whether a digital coin is still valid, the value must be stored entirely in a tamper-resistant and trustworthy
6 physical wallet rather than in some external database. But then no backup is possible: if the owner loses the wallet, she loses all the money as well. In the proposal by Kahn et al, however, if the CBDC stored in the wallet has an expiration date, then, if the wallet is lost,
7 its owner might eventually ask the central bank to reissue the missing CBDC—a considerable improvement over the loss of a wallet full of physical banknotes, which is irreversible.
Why is expiring cash difficult to implement? The defining feature of expiring digital cash is that it gives its holder Alice some purchasing power until some announced expiration date, after which this purchasing power abruptly disappears. This clearly gives Alice an incentive to exercise that purchasing power while it is still available, but at the same time transfers the problem to Bob, the party who would receive the expiring cash. Presumably, in exchange for the cash, Bob is offering Alice a product or service of some value. There are at least two mutually exclusive cases, examined next, each with its own problem.
These two cases do not, strictly speaking, exhaust the possible options
9 but they suffice to illustrate that an important design decision must be taken on the matter of transferability of expiration and that neither of these two mutually exclusive approaches is trouble-free.
We identify the following stakeholders, with their respective interests.
The issuer. This is the institution (central bank?) that creates the digital cash and programs it to be expiring. Whatever motives the issuer might have for wanting the cash to expire,
10 a primary goal of the issuer must be to ensure that the expiration mechanism cannot be circumvented by other parties. In the rest of this paper we assume that the issuer’s motive for introducing expiring cash is specifically to support a monetary policy of encouraging consumer spending in a recession and, consequently, of discouraging hoarding of stimulus funds.
The original recipient. This is Alice in the above scenario, the party who first receives the expiring digital cash.
11 Alice’s motive is to gain the maximum benefit from this unexpected windfall. While in some cases (e.g., relief for victims of natural disaster) Alice might indeed need to spend it all immediately on essential necessities, in other circumstances she might see greater benefit in saving it for an even rainier day instead of spending it all before the expiration date. Thus, whenever Alice’s goal is to preserve the purchasing power of the received digital cash for as long as possible, her goal is in direct contrast to that of the issuer, creating an adversarial relationship between them.
The secondary recipient. This is Bob, the party from whom Alice might like to buy goods or services by paying for them in expiring digital cash. Bob has not received the direct benefit of a windfall. He must assess whether it is worth his while to trade his goods or services in exchange for expiring digital cash, whereas normally he would receive non-expiring digital cash in exchange for them.
12 The context might be that perhaps, in those disastrous circumstances that required the aid or stimulus, there is nobody around with enough non-expiring cash to buy the goods at their full price,
13 and that it is therefore better for Bob to be paid in expiring digital cash than not to be paid at all. However he too, like Alice and everyone else, would much rather receive the same nominal amount in unfettered non-expiring digital cash, if given the choice. If, as in Case 2, the issuer guarantees to take back Bob’s expiring digital cash and exchange it for regular digital cash, then Bob will have no objections to this scheme. However, absent this guarantee, as in Case 1, he will have an incentive either to refuse the expiring digital cash altogether or to cheat the system (possibly, but not necessarily, in cahoots with Alice) and therefore his goal, too, will be in conflict with that of the issuer.
4. Implementations, Attacks and Countermeasures
We open this section by describing the Shenzhen experiment (
Section 4.1) that motivated our enquiry into expiring digital cash. Extrapolating from that context, and with reference to a hypothetical setting in which the issuer creates expiring digital cash for the purpose of dispensing stimulus money along the lines of a Gesellian monetary policy, we then explore a variety of possible attacks and countermeasures.
Following the guidelines of the Threat Modeling Manifesto (
Braiterman et al., 2020), we assembled a diverse team of coauthors with varied viewpoints whose members contributed research expertise in cybersecurity, financial systems and AI (among other topics), together with first-hand experience of consumer payment systems in America, Asia and Europe. We adopted a brainstorming process in which each of us contributed ideas for possible attacks that were later refined and criticised by the whole team. After envisaging a variety of attacks and coming up with possible remediations, we reordered and classified the attacks by semantic similarity, as summarised in
Table 1. While we systematically explored the viewpoints of the various participants we identified, looking for situations in which each of them might mount an attack, we do not claim our taxonomy is exhaustive: it is merely suggestive of a variety of possible attacks.
14We also tried to abstract away from the motivating example of the Shenzhen experiment and thus kept an open mind about the fact that expiring digital cash might be implemented in other ways than through a CBDC, such as through a decentralised blockchain.
4.1. Implementation: The CBDC-Based Shenzhen Trial
In 2020, the People’s Bank of China (PBC) conducted a trial in Shenzhen’s Luohu District in which expiring digital cash was distributed to a subset of the residents through a lottery. The event was called “Enjoy Gift Luohu Digital RMB Red Envelope” (
Shenzhen Special Zone Daily, 2020). The “red envelope” is a traditional Chinese gift, often containing cash, given during special occasions such as Lunar New Year, weddings, or festivals as a gesture of good luck.
The expiring e-CNY distributed in the Shenzhen trial only had validity for less than a week, from 18:00 on 12 October 2020 to 24:00 on 18 October 2020. The digital cash could only be spent at one of 3389 designated merchants in Luohu District that had completed the digital e-CNY system transformation. The holder of the digital cash was not allowed to transfer it to other individuals. CNY 200 (≈30 USD at the time) was distributed to each of 50,000 individuals, for a total of CNY 10,000,000 (≈1.5 million USD).
According to an official statement of the
State Council of the People’s Republic of China (
2020), the trial was intended to stimulate consumption and boost domestic demand during the COVID-19 recovery period, but was also a routine test in the development of the digital e-CNY.
The stated usage restrictions meant that Alice could only pay a merchant, not another individual. Arguably this made the handed-out cash more like a coupon or voucher
15 than actual cash that may be spent anywhere. Alice was explicitly prohibited to use this so-called cash to settle a debt with her non-merchant friend Charlie. And, even if Charlie had been willing to accept it nonetheless, he would have ended up being encumbered with expiring digital cash himself—which, as we observed in
Section 3 assuming Case 1, would have been worth less to him than the same nominal amount of regular non-expiring digital cash.
We observe in passing that the Shenzhen experiment used Case 2 (in which the issuer guarantees that the designated merchants may exchange the expiring cash they receive from buyers against conventional non-expiring cash). This is therefore the case we assume by default in the hypothetical attacks that we describe in the following sections, unless we explicitly specify otherwise.
4.2. Attack: Fake Transactions
As we noted when we introduced Case 2 in
Section 3 on page 5, whenever the digital cash no longer expires after it is acquired by the secondary recipient, an obvious attack becomes possible: the secondary recipient Bob could complicitly convert the digital cash of the original recipient Alice from expiring to non-expiring and return it to her, while charging an unlocking fee. Several variations are possible on this general pattern, as seen in this section and in
Section 4.3 and
Section 4.4.
Alice pretends to buy an item from Bob. On payment, the expiring cash received by Bob becomes non-expiring. Bob returns it (minus an unlocking fee) to Alice. She does not collect the item, which might not even exist: the whole transaction could be totally fake so long as Bob, owing to his status as merchant, is able to redeem the expiring digital cash from the issuer in exchange for regular digital cash.
The victim, in this attack, is the issuer, whose intended monetary policy is violated when Alice and Bob break the expiration mechanism. If the issuer can trace all financial transactions,
16 it may be able to detect the attack by spotting the pattern whereby Alice pays Bob and then Bob pays back Alice (almost) the same amount. However, Bob might pay back Alice using a less traceable channel (e.g., physical cash), making detection harder.
The issuer might also demand to see the receipt for the goods that Alice claims to have bought from Bob, and the physical goods matching that receipt, or proof that they have been destroyed. Such a check would be onerous for the issuer; to scale it to the whole population while limiting costs, the issuer might adopt a sampling approach, possibly using the strategy first proposed by
Wheeler (
1997) of making the penalty for violating the rules so draconian as to make it not worth for Alice and Bob to attempt the attack, even though their probability of being subjected to a spot check would be low.
4.3. Attack: Fake Refunds
In this variant of the attack of
Section 4.2, Alice purchases an actual product (say a TV set) from Bob with expiring digital cash, and Bob processes this sale as normal. After the expiration of the cash, Alice returns the item. Bob restocks the item and refunds Alice in non-expiring digital cash or in non-expiring store credits.
17 Compared to the attack of
Section 4.2, this one has the advantage of offering Bob some plausible deniability: the refund is a normal business practice and Bob was not able to refund Alice using the same payment medium she used (as is customary to protect the merchant from frauds by the purchaser) because her cash had expired; so Bob has the perfect cover story for refunding Alice in non-expiring cash.
As before, this attack only works in Case 2, because it relies on Bob’s ability to return the expiring digital cash to the issuer (thanks to his status as merchant) in exchange for regular digital cash.
Again, the victim in this attack is the issuer, since Alice and Bob cooperate to defeat the expiration mechanism.
The fact that Bob covers his tracks with a plausible cover story makes detection of this attack slightly harder for the issuer, even if it is able to observe money flows. However, to counter this attack, the issuer might apply anomaly detection: if the issuer monitored the ratio between returns and sales for each merchant, fraudulent merchants would stand out if they engaged in this attack at scale.
One might think that another possible countermeasure from the issuer might be to force the merchant to refund the item with expiring digital cash. But what would be the expiration date of the refund? If it is the same as that of the cash used for the original payment, Alice’s workaround is to ask for a refund after the original digital cash has expired (assuming that the warranty on the TV lasts longer than the expiring cash with which she purchased it). If instead the refund grants Alice additional time to spend the returned cash,
18 she has thus managed to extend the duration of her original expiring cash, so this is still an attack, even though its power is now reduced.
4.4. Attack: Laundering Through Payment Platform
In this further variant of the attack of
Section 4.2, a third-party payment platform acts as intermediary, allowing Alice to deposit her expiring digital cash onto an account she holds there. The assumption is that, when Alice deposits her digital cash onto the platform, the platform becomes the secondary recipient (even though it is not a merchant) and is therefore able to return Alice’s expiring digital cash to the issuer and redeem it for regular digital cash. We still assume Case 2, as in
Section 4.2 and
Section 4.3.
The platform then provides options to convert Alice’s balance into digital credits (e.g., Alipay), or into prepaid cards from itself or various other issuers, or into any other forms of money. At that point, the expiration restriction has been removed. Alice may, even after the original expiration date, use the digital credits to buy real goods, resell the prepaid cards to third parties for cash, or even withdraw the balance for cash directly. As ever, Alice will incur an unlocking fee: either a straightforward platform fee or perhaps, in the case of prepaid gift cards, a reduced platform fee plus a slight reduction in the redeemable value when reselling the less-fungible prepaid gift card if it is locked to a particular store.
Once more, the victim is the issuer, since Alice and the platform cooperate to break the expiration mechanism.
The enabling assumption of this attack seems not to hold for the Shenzhen experiment, since a payment platform would not qualify as one of the 3389 designated merchants. Perhaps a dishonest designated merchant might stage this attack by
also acting as a payment platform, in the same way that some newsagents also sell basic groceries and have a post office licence. But then the issuer might detect the attack by monitoring not only whether Bob is a designated merchant but also whether, in that particular transaction for which he wants to redeem the non-expiring equivalent of the incoming expiring cash, he sold an approved item as opposed to taking an incoming deposit. As with the countermeasures discussed in
Section 4.2, the issuer might perform random checks and demand to see receipts (from Alice) and sales logs (from Bob).
4.5. Attack: Buying Assets as Long-Term Store-of-Value
Alice purchases assets that retain long-term value, such as precious metals, collectibles, real estate, non-perishable commodities, art, foreign digital cash or prepaid store cards.
19Alice may use the assets herself (arguably in full compliance with the issuer’s original intentions, although the issuer might have wanted to limit what she could buy to specific asset categories) or resell them for cash at a later date.
Here too, once again, the victim of the attack is the issuer, whose intended monetary policy is violated when Alice defeats the expiration mechanism.
As for possible countermeasures, similarly to
Section 4.2, the issuer might carry out random spot checks, with heavy fines as deterrent. First of all, the issuer might indeed check that Alice only bought approved items from approved vendors. Second, the issuer might do further spot checks some time later, asking Alice to prove that she still has the item (though it may be harder to ask her to prove that she
consumed a perishable and legitimately-bought item; but then a consumable would be harder for Alice to use as a long-term resaleable asset for mounting this attack). If the issuer could observe all digital cash flows in and out of Alice, it might be in a position to notice whether Alice resold an item; but Alice might receive payment in so many alternative ways, including in kind, that it would be hard even for a powerful issuer to be certain to have monitored them all.
4.6. Attack: Registering as a Merchant
Alice registers as a designated merchant in order to earn the licence to redeem expiring cash back into non-expiring cash. When she receives the handout in expiring digital cash, she pays it to herself (or, more precisely, to her merchant persona, which would have to be a different digital wallet), thereby unlocking it.
Once again, the victim in this attack is the issuer, whose monetary policy is violated by Alice breaking the expiration mechanism.
This attack is not particularly strong because we assume it would be trivial for the issuer to discover it through anomaly detection analysis of the financial flows. Unless Alice actually started a real business, she would stand out as a merchant who redeems expiring cash but has no sales.
4.7. Attack: Faking the Merchant Flag
In this variant of the attack in
Section 4.6, Alice pretends to be a merchant not by registering as one but by some low-level hacking of whatever flag indicates the status of her wallet as a merchant’s wallet. The attack is predicated on Alice’s technical ability to do so. Whether this is at all realistic (and it might not be) depends on the implementation. If she succeeds, she gains the same ability (of converting expiring cash into non-expiring) as in
Section 4.6, and proceeds accordingly.
Once again the victim of this attack is the issuer, for the usual reason.
This attack seems particularly weak, firstly because it depends on the existence of some technical vulnerability in the implementation of the merchant wallet, and on Alice’s ability to exploit it; and secondly because it will be easy for the issuer to verify at the back-end whether Alice is truly a designated merchant (regardless of the flag on Alice’s local wallet) before redeeming the expired cash.
4.8. Attack: Collateral for Loan
This attack is qualitatively rather different from the others so far described. It is also the first of our attacks that applies to both Case 1 and Case 2.
Alice puts down her expiring cash as collateral for a loan, to be repaid (in non-expiring cash) before the expiration of her cash. In exchange for this guarantee, the lender lends her the same amount in non-expiring cash. minus a lending fee. Alice disappears, taking with her the borrowed non-expiring cash. The lender sees she does not repay the loan on the agreed date, so he repossesses the collateral. However, shortly afterwards, the collateral expires and becomes worthless. As a result Alice has converted her expiring cash into non-expiring (minus the lending fee), while the lender has lost all the cash he lent her. For once, the victim is not the issuer but our new character, the lender.
There are, however, a few objections.
First, under the terms and conditions of the Shenzhen experiment, the lender would not qualify as a designated merchant. Therefore, (a) Alice would not be able to pay him in the first place; and (b), even if she did, he would not be able to redeem the expiring cash if he needed to repossess the collateral; therefore, with awareness of point (b), he should never consent to loan anything to Alice, even at a premium, since her collateral offers him no guarantee of recovering his loan. However, if we relaxed the Shenzhen terms and conditions and we allowed Alice to pay her expiring digital cash to anyone, then the scenario would still be plausible under both Case 1 and Case 2.
In Case 1, the collateral eventually expires: if the lender does not redeem it before then, he loses it. If he attempts to redeem it, though, in the time window between the expiration of the loan and the expiration of the cash, he will find that, on the open market, it is worth less than its nominal value because of the “haircut” described in
Figure 1. A rational lender would want to ensure that the collateral covers him in full in case of Alice’s default; so, before issuing the loan, he would demand an additional premium from Alice to compensate for the estimated haircut at the (future) time of loan redemption.
In Case 2, instead, after having been paid to the lender, the collateral no longer expires. The lender is able to cash in the full amount of the collateral if Alice defaults. As a result, Alice would still win (having converted her expiring cash into non-expiring), the lender would be covered by redeeming the collateral in non-expiring cash from the issuer and would thus be indifferent to the attack, and the victim would now be the issuer, whose monetary policy would be violated by Alice having broken the expiration mechanism.
Second, the attack as we originally described, in which the loser is the lender, relies on Case 1 and on the carelessness of the lender. The lender only loses out if, in Case 1, he fails to redeem the collateral before it expires (or, worse, if he fails to notice that the collateral expires in the first place). A careful lender would immediately cash in the collateral
20 as soon as the loan expired unpaid. Then he would not suffer any attack, as he would recover his loaned money in full. Alice would have converted the expiring cash into non-expiring, thus again cheating the issuer, but would have had to pay the haircut premium for that.
21 In Case 2, instead, as we already said, the lender is protected from the attack because his collateral does not expire, and the victim of the attack is only the issuer.
In terms of countermeasures, the terms and conditions of the Shenzhen experiment are a preventive safeguard against the attack because, as we said in the first point above, they prevent Alice from paying the lender because he is not an approved merchant.
Without the Shenzhen restrictions, in Case 1 the obvious countermeasure is for the lender to redeem the collateral as soon as the loan expires unrepaid (and of course to demand the haircut premium before agreeing to the loan). In Case 2, where the victim is the issuer, the usual countermeasure of
Section 4.2 (namely probabilistic spot checks on whether Alice spent the cash in the prescribed way) might still detect and deter the attack, but it would be reasonable to object that the issuer ought to have imposed Shenzhen-style constraints in the first place as a much better safeguard that would have prevented the attack altogether.
4.9. Attack: Wrapped Token
In DeFi, wrapping a digital asset consists of placing it in secure storage and minting a new token of equivalent value on a different blockchain. It is commonly done to facilitate cross-chain compatibility, for example to be able to trade Bitcoin on the Ethereum blockchain.
In this attack, a variation of the one in
Section 4.8, Alice wraps her expiring digital cash in some non-expiring cryptocurrency and then passes on the wrapped token to merchant Bob who accepts it at face value, exchanging it for non-expiring cash or an asset of equivalent value. In Case 1, when the cash inside the wrap expires, it is Bob who loses out. In Case 2, it is the issuer. In either case, Alice has converted her cash from expiring to non-expiring.
Here too, in Case 1 the attack is predicated on Bob’s carelessness: in other words, it only works if Bob does not notice that the cash inside the wrap has an expiration date (otherwise he would be wise not to accept it, or at least not to accept it without a commensurate haircut premium; and in any case he should redeem it for non-expiring cash before its expiration).
The fact that Bob is a merchant rather than a lender makes this attack possible under the Shenzhen terms, unlike that of the previous section. Since the Shenzhen terms imply Case 2 (expiring cash becomes non-expiring as soon as an approved merchant receives it), the attack becomes a variation of the “fake transaction” of
Section 4.2 or of the “fake refund” of
Section 4.3.
Regarding countermeasures, in Case 1 (non-Shenzhen) the situation is similar to that in the previous
Section 4.8: Bob must demand a haircut premium before accepting the wrapped token and must redeem it for non-expiring cash as soon as possible. From a socio-technical and usability-centric viewpoint, however, we note that this remedy is not quite so simple in practice—deception is at the root of many scams (
Stajano & Wilson, 2011) and blaming the victim for carelessness is not a working solution. Neither is demanding the potential victim’s attention every time, even with the good intention of preventing scams: the user’s attention is limited, so is their compliance budget (
Beautement et al., 2008), and crying wolf exhausts both quickly. Better interface and interaction design is called for, in order to defeat the fraudster.
In Case 2 (possibly Shenzhen), Bob is safe if he knows he will get back non-expiring cash from the issuer. If the issuer wants to prevent Alice from making her received cash non-expiring, the countermeasures of
Section 4.2 and
Section 4.3 apply—that is to say, probabilistic spot checks on whether Alice and Bob are violating the spirit of the rules by not engaging in a genuine sale of an approved article, with heavy penalties as deterrent.
4.10. Trivial Countermeasures
Shenzhen trial aside for the moment, if digital cash were untraceable then an issuer would not be able to enforce restrictions on where it is spent. Conversely, if the issuer had perfect visibility of all digital cash transactions, many of the attacks that attempted to circumvent the issuer-imposed restrictions would be trivial to detect and stop (or at least threaten to punish after the fact, as a deterrent).
Depending on where the underlying digital cash implementation is situated on the privacy spectrum—from the total observability favoured by dictatorships and law enforcement on one extreme to the total untraceability favoured by civil libertarians and criminals on the other—the technical ability of the issuer to detect attacks and enforce restrictions on the use of the digital cash is modulated accordingly.
While Bitcoin’s original blockchain attempted to protect privacy of digital cash users by making them pseudonymous, this lack of traceability was promptly exploited by criminals, who used Bitcoin as the currency of the Dark Web: drugs and arms trade, extortion, ransomware and so on.
22 For crime prevention reasons, most governments impose strict KYC/AML
23 regulations on the use of money of any kind, whether traditional or digital. CBDCs, being government-endorsed, will undoubtedly be based on a strong KYC/AML foundation. Cryptocurrencies, as they become mainstream, are being subjected to similar regulations: acquiring and holding Bitcoin legally, these days, requires interacting with approved and highly regulated exchanges that will insist on KYC/AML.
All this to say that it is unrealistic to expect cash-like anonymity and untraceability for any implementation of (expiring) digital cash that goes mainstream, whether based on CBDCs or cryptocurrencies.
From an intellectual viewpoint, the greater the powers of traceability and control the issuer has over the digital cash, the easier and less challenging the problem of enforcing the rules becomes, at the expense of privacy and civil liberties for the citizens who use the digital cash. If the issuer can observe every transaction, most attacks are detectable. If the issuer can also revoke individual digital cash units (a much greater power!), the effects of most attacks can be reversed, if not prevented altogether.
Indeed the attacks in
Section 4.2,
Section 4.3,
Section 4.4 and
Section 4.5 are all trivially defeated by the issuer specifying what the original recipient is allowed to do with the received expiring digital cash and then making those digital cash units worthless unless spent in compliance with those terms. The party who loses out when the cash expires might be the secondary recipient rather than the original recipient but, if so, this obviously imposes a strong incentive on the secondary recipient not to accept expiring cash other than for transactions that fully comply with the issuer’s policy. Besides, a government-backed issuer might impose additional punishments on the original recipient (or indeed on both parties) for mis-spending the expiring cash in violation of the agreement under which it had been originally gifted.
Although we do not have many technical details on the implementation of the expiring e-CNY used in the Shenzhen trial, it was obviously an instance of a CBDC issued by the People’s Bank of China. We therefore assume that the PBC retained full observability of the whereabouts and ownership of each digital cash unit in circulation, as well as the ability to revoke individual digital cash units. The issuer would thus have had the technical ability to detect, defeat and punish almost all of the attacks we described.
For this reason, from a research perspective we move on from the Shenzhen experiment. There is no great research challenge in defending the security of CBDC-based expiring digital cash for an all-seeing and all-powerful issuer.
4.11. Alternative Implementation: Decentralised Expiring Digital Cash
Let us instead consider the alternative hypothetical scenario in which the issuer creates expiring digital cash not as a specially programmed CBDC but as a contract on a public programmable blockchain. As a motivation we might again imagine that the issuer of the expiring digital cash, this time for example a government agency or even a philantropic foundation rather than the central bank, wishes to distribute aid to certain beneficiaries (e.g., to stimulate the economy during a recession, or to help a population hit by a natural disaster) provided that the aid is used for specific purposes, rather than hoarded or wasted on luxury items. Whether the aid consists of existing money that the issuer had already set aside or (as in the case of helicopter money) of new cash printed for that purpose, in this scenario the issuer of the expiring digital cash transfers that cash onto a public blockchain and creates the expiring digital cash there, with an appropriate smart contract.
It is this smart contract that defines the conditions under which the digital cash expires and what happens to it on expiration. Obviously, expiration will occur when the expiration date is reached; but also when the digital cash is used in transactions that do not comply with the terms under which it was issued. On expiration, the digital cash returns to the issuer: it becomes worthless to whomever held it at that time, but it does not disappear from the system.
24To what extent can the issuer’s terms and conditions on the use of the aid be codified in a smart contract? Can the blockchain tell whether the recipient is one of the designated merchants? Can the blockchain tell whether the item being bought in the transaction is among the approved ones? The only constraints that can be codified in the smart contract are the ones corresponding to predicates that can be verified without human intervention.
Will the smart contract implement Case 1, where the digital cash expires at the specified date regardless of who holds it, greatly reducing (perhaps even destroying) the acceptability of the digital cash by third parties? Or will it implement Case 2, where the digital cash stops expiring when first spent, as in the Shenzhen experiment, ensuring that the digital cash will be spendable but laying the system open to the many attacks we described? Could any of these attacks be successful in the decentralised scenario? This largely depends on the previously highlighted point: how many of the issuer’s terms and conditions can be codified in the smart contract? Those terms that can be codified will be automatically enforced. The others will probably create loopholes and, most likely, corresponding attacks. It will then be a burden for the issuer to detect and pursue those violations off-chain after the fact. (And we are not even talking of possible bugs and security vulnerabilities in the code of the smart contract).
All of the above questions might be worth investigating further in future work. While a government agency and a public blockchain make strange bedfellows, the question of how to ensure the security of a programmatic feature of digital cash (in this case: expiration under certain conditions) without having full KYC observability and full control of the underlying platform is an interesting research problem.
5. If It Expires, Is It Still Digital Cash?
It should come as no great surprise that implementing robust and secure expiring digital cash is much simpler in a fully traceable centralised environment than in a privacy-protecting decentralised one—provided one trusts the central authority not to abuse its far-reaching powers. Not just the power of snooping but also the even more ominous power of selectively revoking the currency units of the individuals it dislikes.
Someone who, perhaps inspired by the pioneering work of
D. Chaum (
1985), took the stance that cash-like anonymity ought to be a defining property of digital cash, might at this point argue that
expiring digital cash cannot be digital cash, if it has to give up its anonymity in order to be implemented securely—although, to be fair, they might have to say the same of most CBDCs (given their requirement to comply with KYC/AML/CFT regulations), and of most cryptocurrencies after reading
Greenberg (
2022).
Similarly, someone who took the stance that being a store of value is a defining property of money and thus of digital cash might at this point argue that
expiring digital cash does not qualify as digital cash, because it no longer retains its value after expiration—although, to be fair, they might have to say the same of many cryptocurrencies, given their wild volatility.
25Furthermore, as we noted in
Section 4.1, something that can only be spent at specific merchants and on specific goods sounds more like a coupon, a voucher or a store card than cash, which instead is totally fungible and can be spent anywhere and on anything. The
European Central Bank (
2012) published a study on “Virtual Currency Schemes” (as distinct from real currencies like the USD or the EUR) that encompassed, under that umbrella term, schemes as diverse as air miles, Second Life’s Linden Dollars and the then nascent Bitcoin. They noted in passing that the total value of Frequent Flyer programmes had been reported by
The Economist in 2005 as having already surpassed the M0 dollar money supply (banknotes and coins in circulation). A distinguishing feature of the various kinds of virtual currency schemes, which the report accordingly classified into three buckets, is their convertibility to and from real-economy money: the Type 1 virtual currency cannot be converted; the Type 2 can be bought with real money but not vice-versa; whereas the Type 3 enjoys bidirectional convertibility with real money. It is significant that the terms and conditions of the Shenzhen trial explicitly prevented recipients of expiring e-CNY from transferring them to other individuals. Naturally, such restrictions can be circumvented by trading the virtual currency in a (black) market, which always inevitably happens, legally or illegally, when there is enough demand. Indeed,
Jenjarrussakul and Matsuura (
2014) studied the liquidity of the many loyalty point programmes available to customers in Japan, concluding among other things that the virtual currencies with the greatest liquidity experienced the more significant security incidents. Clearly, vouchers that can be exchanged for only a limited range of goods are less attractive than fungible cash, and quite distinct from it. In that sense, the expiring e-CNY distributed during the Shenzhen trial did not enjoy the same purchasing power as genuine CNY, given the restrictions on where, when and on what they could be spent. On that basis, we do not believe those expiring Renminbi ought to be counted as cash.
26Crucially, we observe that the practice of handing out cash that can only be spent within a certain period and on certain items and at certain retailers is not fundamentally a feature of the medium of exchange (digital or otherwise) but rather of the agreement that regulates the transaction.
We argue it is improper, or at least misleading, to speak of “expiring digital cash” and thus to attribute the expiration to the medium of exchange. The expiration is not a feature of the cash (which, if it expired, could no longer be considered a trustworthy store of value): it is instead one of the many terms of the contract between issuer and recipient, which could very well be implemented with traditional non-digital, non-programmable cash. The issuer might say:
I grant you this gift of X dollars on condition that you spend it according to these terms (spend it by this date, only on a subset of these designated items, only buying from these approved suppliers, etc etc). If you violate these terms, you will have to repay the gift and also pay a fine.
This is simply a contractual agreement and has nothing to do with the payment medium, whether digital, programmable or otherwise. It does not require expiring digital cash in order to be implemented or enforced.
While we do not question that the described functionality might have plausible uses, a much clearer mental model than “expiring cash”, in our view, is that what expires is the agreement, not the digital cash. The donated cash does not expire, it just changes hands (possibly returning to the original donor) when the underlying contract says it should.