Abstract
Privacy enhancement technologies are significant in the development of digital payment systems. At present, multiple innovative digital payment solutions have been introduced and may be implemented globally soon. As cyber threats continue to increase in complexity, security is a crucial factor to consider before adopting any technology. In addition to prioritizing security in the development of digital payment systems, it is essential to address user privacy concerns. Modern digital payment solutions offer numerous advantages over traditional systems; however, they also introduce new considerations that must be accounted for during implementation. These considerations go beyond legislative requirements and encompass new payment methods, including transactions made through mobile devices regardless of internet connectivity. A range of regulations and guidelines exist to ensure user privacy in financial transactions, with the General Data Protection Regulation (GDPR) being particularly notable, while technical reports have thoroughly examined the differences between various privacy-enhancing technologies. Additionally, it is important to note that all legal payment systems are required to maintain information for audit purposes. This paper introduces a comprehensive framework that integrates all critical considerations for selecting appropriate privacy enhancement technologies within digital payment systems, while it utilizes a detailed scoring system designed for convenience and adaptability, allowing it to be employed for purposes such as auditing. Thus, the proposed scoring framework integrates security, GDPR compliance, audit, privacy-preserving technical measures, and operational constraints to assess privacy technologies for digital payments.
1. Introduction
In previous decades, cash was the predominant means of conducting financial transactions. Currently, 75% of adults globally utilize some form of digital payment, reflecting notable expansion—especially within developing economies. In developed nations, the rate is even higher, with adoption reaching 96% among adults in OECD member countries. The emergence of new and evolving payment methods has introduced numerous uncertainties, particularly regarding user privacy. Each payment system features unique characteristics, whether related to the security mechanisms incorporated into transaction processing or the extent of privacy protection offered to users. Privacy, within the context of different payment systems, is subject to varied interpretations. Economic literature indicates that the value of money can be closely linked to the level of privacy it ensures [1,2]. This is reflected in the fact that the accessibility of transaction data varies among payment mechanisms, with certain data being visible to multiple entities while others remain protected through mechanisms such as cryptography. Since digital transactions involve sensitive personal and financial details, how well a payment system protects this data is crucial for its reputation. Trust acts as a crucial link between users’ sense of privacy and their readiness to use a payment platform. If privacy safeguards are weak, people may consider the system unsafe, which can lead to fewer users adopting it.
When designing digital payment systems, several key parameters require consideration, including user privacy, transaction integrity and security, monitoring mechanisms for illegal activities, and the system’s resilience during high transaction volumes. The development of technologies such as artificial intelligence (AI) and quantum computing has introduced significant changes. For instance, many financial institutions are updating their information security infrastructures, particularly encryption algorithms, to implement “Quantum-Resistant Algorithms” [3], which aim to withstand cyberattacks from both classical and quantum computing systems [4,5]. Additionally, financial transaction data has commercial value and is important for maintaining user privacy.
Currently, there are multiple digital payment options available to users. Individuals choose different methods based on their specific requirements. Examples include bank cards, digital wallets, FinTech applications, e-banking services, cryptocurrencies (which have limited acceptance), and the planned introduction of a Central Bank Digital Currency (CBDC) in the European Union [6,7,8]. When privacy protection is the main selection criterion for digital payment methods, making a decision can be challenging. Understanding how transactions work and evaluating methods for safeguarding personal data requires knowledge in cryptography and computer science. Cash transactions typically provide the highest level of anonymity and are often used as a benchmark for privacy.
Privacy-related technologies are typically classified into two principal categories. The first type includes records that use controlled access, allowing the data holder to view information without needing extra permission. For instance, electronic health record systems commonly use role-based access control (RBAC), so authorized medical staff can directly access patient data based on their specific roles. However, this method is not suitable for digital payment systems. The second dimension involves data protection mechanisms inherently based on cryptographic methods, ensuring that the protected information remains inaccessible to the data holder. Presently, only the latter method is utilized for safeguarding user data. Law enforcement and governmental agencies have advocated for a third framework: by default, it would employ strong cryptographic protections, but permit decryption of financial data under specific circumstances to assist investigations into potential fraud. To date, this model has yet to be realized in practice. Additionally, the effective assessment of encryption technologies for digital payments must consider not only privacy concerns but also the security of financial data and audit capabilities. Considerations related to the stability and regulation of the financial system are likewise essential.
The main objective of this work is to establish a comprehensive framework that consolidates all critical components of digital payment systems, ensuring that privacy considerations are addressed alongside other essential requirements. Furthermore, we introduce a unified scoring framework for assessing privacy technologies, which incorporates carefully selected technical indicators not explicitly covered by the GDPR. This framework generates quantifiable results that support objective comparisons between various privacy technologies and serve as a reliable basis for auditing and evaluation. The research hypothesis made is that a quantifiable, multi-criteria scoring model will enhance the evaluation and selection of PETs in digital payment systems, improving privacy, auditability, and regulation compliance.
2. Methodology
To select suitable privacy enhancement technologies for digital payment systems that align with privacy and regulatory requirements, it is necessary to first determine the types of data produced during financial transactions. Every electronic payment transaction generates varying amounts of data associated with the parties involved [9]. The specific data requirements are influenced by factors such as transaction size and whether the transaction takes place within a single financial institution or across multiple institutions. Our primary contribution is the development of a framework for assessing encryption technologies in digital systems with respect to privacy. Different types of data may not be generated by all digital payment systems; in some cases, this is determined by how the payment system is implemented.
The Table 1 presents five primary categories of data produced during financial activities.
Table 1.
Categories of data during financial transactions.
Digital payment platforms encounter cyber threats comparable to those faced by other information systems. Ensuring robust security measures during the design phase of digital payment systems is of paramount importance. Security measures not only serve to maintain confidentiality, integrity, and authentication but also play a crucial role in fraud detection and compliance with regulatory standards [10]. Currently, the field of security is closely integrated with advancements in artificial intelligence to effectively prevent and promptly detect potential attacks and malicious activities. Studies [11,12] have identified the main privacy risks. The Table 2 lists types of information that can be exposed in cases where digital payment systems are under specific attacks.
Table 2.
Cyber threats.
2.1. Designing the Evaluation Framework
For creating a framework to evaluate privacy protection in digital payment systems, it is important to first specify the main dimensions of assessment criteria. To this end, we have identified five dimensions with the corresponding metrics for each one.
The first three dimensions that we adopted are security, privacy-preserving technical measures, and auditability. It is rather evident that the requirements stemming from these three dimensions can be contradicting and thus very difficult to satisfy concurrently [13,14]. For instance, data protection necessitates robust encryption mechanisms, while effective auditing relies on the ability to identify parties involved in transactions. Consequently, as the strength of encryption algorithms and privacy protection measures increases, it becomes more complex to monitor transactions in instances of unlawful activity [15]. At this stage, our work has focused on establishing and validating the initial structure of the framework, and thus, the evaluation has been based on equal-weighted dimensions. Our future plans include the definition and testing of different weights for each dimension, which can vary depending on the digital payment system’s characteristics. The outcomes of this scoring system facilitate the management of competing objectives, such as balancing privacy with audit requirements. Although conditional data decryption has been investigated in research, no practical or standardized method has yet been defined. The fourth dimension of the assessment criteria is GDPR compliance, and the fifth is operational constraints. Further details for each dimension of the framework are provided next.
2.2. Security
Security plays an important role in the deployment of digital payment systems. Its primary function is to protect transactions from being altered. Additionally, the selected security technology should be designed to resist both current and potential cyberattacks and to preserve data integrity and confidentiality. Furthermore, it is essential for regulators and auditors to identify transactions that are fraudulent or have been falsified. Achieving an optimal balance among security, auditing, and privacy presents significant challenges when determining the most appropriate security strategy for digital payments [16]. Furthermore, we have established a scoring system to assess the security level of the digital payment system under evaluation.
2.3. Privacy-Preserving Technical Measures—Privacy Enhancement Technologies (PETs)
Without robust data protection measures, users may lack confidence in financial institutions regarding the protection of their privacy. Even though GDPR provides a robust basis for data protection, mainly in terms of legal and organizational requirements, it does not explicitly address specific privacy-preserving technical measures (with the exception of pseudonymization) that are essential in digital payment systems, like unlinkability [17,18], metadata protection [19], and resilience against quantum threats. As numerous organizations and governments have already expressed their intention to expand the use of digital payment systems, it is essential for such privacy-preserving technical measures to be incorporated into the proposed framework. Thus, the proposed framework includes criteria for evaluating the performance of advanced privacy-enhancing technologies (PETs) in digital payment solutions [20,21,22], complementing the GDPR requirements that are examined in the framework’s fourth dimension of criteria. Depending on the privacy protection level that financial institutions decide to achieve, they need to consider the following options:
- Anonymity: This criterion evaluates the extent to which the proposed PETs allow users to provide proof of authorization without revealing their identities.
- Unlinkability: A significant volume of metadata—including traffic analysis, timestamps, device information, and location data—may be generated during financial transactions. The primary objective of this criterion is to prevent the correlation of multiple payments to a single user, thereby safeguarding users from behavioral profiling [17,23].
- Forward and Backward Privacy: This criterion assesses two distinct options: forward privacy [24], which safeguards past transactions if present data are compromised, and backward privacy, which secures future transactions if current information is breached.
- Future Readiness: This criterion primarily addresses resistance to emerging threats such as quantum and artificial intelligence attacks. Privacy enhancement technologies in digital payment systems must proactively incorporate safeguards to mitigate future cybercrime risks.
2.4. Auditability
When developing digital payment systems, procedures should be established to ensure compliance with Anti-Money Laundering (AML) and Countering the Financing of Terrorism (CFT) regulations [21] during all financial transactions. All payment systems should be capable of supplying information to authorities while also maintaining user privacy. Achieving an effective balance between privacy and auditability presents a significant challenge, particularly in discussions regarding future implementations such as central bank digital currencies (CBDCs) [25]. Our research makes a substantial contribution by analyzing the intersection of privacy and auditing, identifying areas where their effective implementation can occur simultaneously. To evaluate the auditability of digital payment systems, an auditability metric is defined in relation to regulatory audits and forensic traceability [26]. This criterion is used to determine whether audit controls can be implemented effectively while maintaining user privacy.
2.5. GDPR Compliance
The General Data Protection Regulation (GDPR) [15] sets the minimum requirements for personal data processing within the European Union, thereby elevating privacy protection by placing particular emphasis on transparency, informed user consent, and accountability in data processing activities. The proposed framework assumes that the processing performed by the digital payment system under evaluation is lawful, and evaluates its GDPR compliance through the following four criteria:
- Purpose Limitation—Article 5(1)(b) of the GDPR: This criterion stipulates that personal data must be collected for specified, explicit, and legitimate purposes, and must not be further processed in ways that are incompatible with those purposes.
- Data Minimization—Article 5(1)(c) of the GDPR: This criterion pertains to data minimization, which is a fundamental principle for personal data processing. The main objective of the article is to ensure that only the data strictly necessary to achieve the intended purpose is collected and processed.
- Storage Limitation—Article 5(1)(e) of the GDPR: This criterion addresses the storage limitation principle. In accordance with this article, data must not be retained indefinitely. Justification for retention should be based on the specific processing purpose, and data should be securely erased once it is no longer required.
- Cross-Border Data Transfers—Art. 45 GDPR: This criterion pertains to the cross-border data transfers provision. The primary focus of this article is to delineate the conditions under which personal data may be transferred to countries outside the European Union.
2.6. Operational Constraints
For digital payment systems, beyond the parameters discussed earlier, it is crucial to account for operational constraints that may substantially affect system scalability and efficiency. In our proposed framework, we have incorporated this dimension with specific criteria to ensure proper implementation. Specifically, the criteria included in this dimension are as follows:
- Interoperability: Interoperability within digital payment systems, in relation to privacy-enhancing technologies (PETs), denotes the capacity for various implementations to operate together across diverse platforms, organizations, and jurisdictions while maintaining privacy standards.
- Scalability: This metric allows our framework to assess the capacity for processing a high volume of transactions per second. By implementing PETs, financial systems can optimize throughput while maintaining robust privacy standards.
- Resource efficiency: Resource efficiency in digital payments involves achieving an optimal balance between robust privacy and security measures and minimizing computational, communication, and energy expenditures. It is essential to evaluate privacy-enhancing technologies (PETs) based on both their effectiveness in safeguarding privacy and their practical operational efficiency.
- Offline payment: Offline central bank digital currency (CBDC) [27], along with other digital payment systems, represents a form of digital currency that facilitates transactions without requiring a network connection. This approach functions similarly to cash, enabling exchanges to occur without third-party intervention. Settlement is finalized when the device subsequently reconnects to the network. The proposed introduction of CBDC from the European Central Bank (digital euro) may make such transactions possible in practice [6]. Offline payments can be implemented using near field communication (NFC), allowing queued transactions to be processed once an internet connection is available.
Table 3 presents a weighted scoring system that incorporates all relevant metrics for each dimension, along with a sub-scoring table that details the evaluation process for each parameter. Our model treats the five main dimensions as equally important, but weights can be assigned and may vary depending on the payment system and evaluation methods. For example, regulations can impose specific constraints, such as requiring real-time transaction verification, thus excluding offline transactions. Additionally, some commercial apps interacting with banks may only need users’ phone numbers for small payments, bypassing digital IDs. Transactions within the same financial institution often differ significantly in terms of regulations and constraints. Therefore, we can adjust the weights for each dimension as needed in each case.
Table 3.
Dimensions—scoring range.
For each criterion related to the privacy-preserving technical measures and operational constraints dimensions, the score is assigned according to the guidelines provided by Table 4.
Table 4.
Scoring explanation.
The overall privacy evaluation score for the digital payment system under review is given by the sum of the scores of each dimension, as shown in the following formula:
The proposed evaluation framework was designed to adapt to specific case requirements. It is possible to assign different weights to the score of each dimension based on specific criteria. For instance, in the case of a dedicated system involving limited financial resources, prioritizing security may prove to be more beneficial than conducting an audit. For large amounts of money, auditability for cross-border transfers is required and cannot be excluded. The application of different weights to certain dimensions may prove to be highly effective in establishing a framework that accurately reflects real-world circumstances.
2.7. Demonstrating the Evaluation Framework
To demonstrate the results of the proposed framework, we selected three privacy enhancement technologies that are widely recognized as effective solutions for digital payment systems. These technologies are as follows [28]:
- Zero-Knowledge Proofs (ZKPs): This represents sophisticated privacy-enhancing technologies that facilitate information verification without revealing the underlying data. Mechanisms utilizing ZKPs are designed to protect both integrity and confidentiality, adhering to the principle of data minimization. Confidentiality is maintained so that, even if the network is breached, the core information stays protected. Moreover, proofs are verifiable, supporting transparency while auditing. However, the computational complexity associated with their implementation poses significant challenges for integration into large-scale, real-time payment and financial systems. Additionally, we should note that despite the high score for privacy, specific implementation limitations, such as latency or processing requirements, might affect real-world adoption.
- Anonymity-enhanced signatures: This technology delivers robust privacy and security by concealing the identity of the signer. These signatures safeguard confidentiality and data integrity and are designed for seamless interoperability. Nonetheless, they demand higher computational resources, and in specific circumstances, the signer’s identity may still be determined.
- Secret Sharing/Secure Multi-Party Computation (SMPC): This measure offers robust security and privacy by distributing data among participants, ensuring that disclosure occurs only through collaborative effort. Moreover, most SMPC protocols require multiple synchronous rounds of communication to ensure correctness and prevent leakage. However, this approach is constrained by efficiency challenges and demands higher computational resources.
In this study, we assume the existence of three distinct digital payment systems, each employing one of the previously outlined privacy-enhancing technologies. For each evaluation criterion, scores must be systematically assigned based on the inherent characteristics and performance attributes of the respective systems. The subsequent table (Table 5) provides a comparative analysis of the three principal privacy-enhancing technologies, evaluated in accordance with the predefined assessment criteria and the unified scoring framework. Given that the specific technical characteristics and security measures of each system must be examined individually—and may obviously differ significantly from one system to another—we consider that this aspect falls outside the scope of the present comparative analysis. Therefore, the security dimension is not rated. The same applies to the GDPR compliance dimension, since the level of compliance of each system must be assessed separately. For all subsequent results, it should be noted that we assume the use of standard equipment without hardware acceleration.
Table 5.
Compare PETs.
It follows, therefore, that the use of ZKPs is superior to other solutions, as it achieves the optimal combined satisfaction of privacy protection and auditability requirements, while not imposing significant operational constraints.
2.8. Comparative Analysis of the Proposed Framework
Although extensive research exists regarding privacy in digital payment systems and associated privacy-enhancing technologies, a comprehensive approach that addresses all aspects of digital payments in relation to these technologies remains lacking. In our study, we review prior work on privacy in payment systems to accurately identify the essential dimensions for developing a holistic, privacy-aware evaluation framework. As noted by Emanuele Borgonovo et al. [15], the degree of financial privacy provided by each medium of exchange largely depends on the transaction processing methods implemented. Thus, the privacy protection offered is determined by the specific implementation of each payment method. Ryan Lavin et al. [28] compare three major privacy enhancement technologies—zero-knowledge proofs, fully homomorphic encryption, and secure multiparty computation—examining their respective advantages and disadvantages related to privacy and security, although they do not address other critical criteria relevant to digital payments.
Comprehensive analyses of privacy evaluation in digital payments are detailed in reports published by international financial institutions such as the International Monetary Fund (IMF) and the Bank for International Settlements [29]. Comparable studies, including research from the Federal Reserve Bank of Cleveland Working Paper Series [30] and other organizations, largely concentrate on security and privacy concerns but do not investigate the specific parameters of digital payment systems in depth. This research aims to bridge the gap between privacy and security by systematically addressing all relevant factors necessary for the effective implementation of a digital payment system.
Table 6 presents a comparison of the proposed framework with two other established frameworks related to privacy awareness in digital payments. The first framework is provided by the BIS, while the second has been established by the IMF.
Table 6.
Comparative analysis of the proposed framework.
Certain criteria, such as offline payment capabilities, are either not fully addressed or are only partially covered. Additionally, areas including forward/backward privacy and the scoring system are omitted by both BIS and IMF. The integration of forward and backward privacy features, along with the implementation of a scoring system for visualization, would offer substantial benefits for comparative analysis and auditing purposes.
3. Conclusions
The contribution of our research extends beyond privacy criteria addressed in the GDPR. Our proposal presents a comprehensive methodology that integrates legal compliance, technical privacy metrics, operational considerations, and audit functions into a unified scoring framework. Unlike previous assessments, which are not specifically designed for digital payment systems, this framework is tailored to their unique requirements, incorporating factors such as offline usability, regulatory audit obligations, forward/backward privacy, privacy technical metrics, operational constraints, and transaction throughput. Furthermore, a comprehensive scoring framework has been established, which can be tailored to suit the requirements of the system being assessed. The proposed methodology is designed to support the evaluation of privacy technologies for emerging solutions, including quantum-resilient systems and AI-driven financial infrastructures. The result is an innovative evaluation model that enables system designers to identify optimal privacy-enhancing technology combinations for digital currencies that balance privacy preservation with auditability.
Author Contributions
Conceptualization, I.F., S.G. and C.L.; methodology, I.F.; writing—original draft preparation, I.F.; review and editing, S.G. and C.L.; supervision, C.L. All authors have read and agreed to the published version of the manuscript.
Funding
This research has not received any funding.
Data Availability Statement
The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding authors.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Kahn, C.M. Payment Systems and Privacy. Fed. Reserve Bank St. Louis Rev. 2018, 100, 337–344. [Google Scholar] [CrossRef]
- Kahn, C.M.; McAndrews, J.; Roberds, W. Money Is Privacy. Int. Econ. Rev. 2005, 46, 377–399. [Google Scholar] [CrossRef]
- Anwar, M. Quantum-Resistant Cryptography: Developing Encryption Against Quantum Attacks. Available online: https://ssrn.com/abstract=5066160 (accessed on 16 August 2018).
- NIST Releases First 3 Finalized Post-Quantum Encryption Standards. Available online: https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards (accessed on 22 October 2025).
- Available online: https://www.bis.org/publ/othp88_system_design.pdf (accessed on 22 October 2025).
- Available online: https://www.ecb.europa.eu/euro/digital_euro/html/index.en.html (accessed on 22 October 2025).
- Available online: https://www.imf.org/en/Publications/fintech-notes (accessed on 22 October 2025).
- Ahnert, T.; Hoffmann, P.; Monnet, C. Payments and privacy in the digital economy. J. Financ. Econ. 2025, 169, 104050. [Google Scholar] [CrossRef]
- The Impact of Central Bank Digital Currency on Central Bank Profitability, Risk-Taking and Capital. Available online: https://www.ecb.europa.eu/pub/pdf/scpops/ecb.op360~35915b25bd.en.pdf (accessed on 22 October 2025).
- Adwani, A. The Evolution of Digital Payments: Implications for Financial Inclusion and Risk Management. Available online: https://ssrn.com/abstract=5201787 (accessed on 22 October 2025).
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data and Repealing Directive 95/46/EC (General Data Protection Regulation). Available online: http://data.europa.eu/eli/reg/2016/679/oj (accessed on 26 September 2025).
- Sahi, A.M.; Khalid, H.; Abbas, A.F.; Zedan, K.; Khatib, S.F.A.; Al Amosh, H. The Research Trend of Security and Privacy in Digital Payment. Informatics 2022, 9, 32. [Google Scholar] [CrossRef]
- Borgonovo, E.; Caselli, S.; Cillo, A.; Masciandaro, D.; Rabitti, G. Money, privacy, anonymity: What do experiments tell us? J. Financ. Stab. 2021, 56, 100934. [Google Scholar] [CrossRef]
- Manigonda, S. Data Privacy and Sovereignty in Financial Technology: Governance Strategies for Global Operations. IJSAT-Int. J. Sci. Technol. 2021, 12, 2021. [Google Scholar]
- Faisal, T.; Courtois, N.; Serguieva, A. The Evolution of Embedding Metadata in Blockchain Transactions. arXiv 2018, arXiv:1806.06738. Available online: https://ieeexplore.ieee.org/abstract/document/8489377 (accessed on 22 October 2025). [CrossRef]
- Balancing Confidentiality and Auditability in a Distributed Ledger Environment, STELLA–Joint Research Project of the European Central Bank and the Bank of Japan. 2020. Available online: https://www.ecb.europa.eu/press/intro/publications/pdf/ecb.miptopical200212.en.pdf (accessed on 22 October 2025).
- Bursuc, S.; Horne, R.; Mauw, S.; Yurkov, S. Provably Unlinkable Smart Card-based Payments. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, Copenhagen, Denmark, 26–30 November 2023; Available online: https://doi.org/10.1145/3576915.3623109 (accessed on 22 October 2025). [CrossRef]
- Rajendran, B.; Pandey, A.K.; Bindhumadhava, B.S. Secure and privacy preserving digital payment. In Proceedings of the 2017 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computed, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), San Francisco, CA, USA, 4–8 August 2017; pp. 1–5. [Google Scholar] [CrossRef]
- Schiansky, P.; Kalb, J.; Sztatecsny, E.; Roehsner, M.C.; Guggemos, T.; Trenti, A.; Bozzio, M.; Walther, P. Demonstration of quantum-digital payments. Nat. Commun. 2024, 14, 3849. [Google Scholar] [CrossRef] [PubMed]
- Privacy and Confidentiality Options for Central Bank Digital Currency, Digital Currency Governance Consortium, World Economic Forum. 2021. Available online: https://www3.weforum.org/docs/WEF_Privacy_and_Confidentiality_Options_for_CBDCs_2021.pdf (accessed on 22 October 2025).
- Karasek-Wojciechowicz, I. Reconciliation of anti-money laundering instruments and European data protection requirements in permissionless blockchain spaces. J. Cybersecur. 2021, 7, tyab004. [Google Scholar] [CrossRef]
- Available online: https://digitaldollarproject.org/wp-content/uploads/2021/10/DDP-Privacy-Principles-10.25.21_Final.pdf (accessed on 22 October 2025).
- Gross, J.; Sedlmeir, J.; Babel, M.; Bechtel, A.; Schellinger, B. Designing a Central Bank Digital Currency with Support for Cash-Like Privacy. Available online: https://ssrn.com/abstract=3891121 or http://dx.doi.org/10.2139/ssrn.3891121 (accessed on 22 October 2025). [CrossRef]
- Available online: https://www.imf.org/en/Publications/WP/Issues/2025/03/28/Privacy-Technologies-The-Digital-Economy-565415 (accessed on 22 October 2025).
- Das, G.; Ali, Y.A.; Singh, B.; Nag, K. Digital Forensics in E-Commerce: Investigating Online Payment Fraud and Data Breaches. Int. J. Innov. Sci. Eng. Manag. 2025, 4, 262–268. [Google Scholar] [CrossRef]
- Nardelli, M.; De Sclavis, F.; Iezzi, M. Hitchhiker’s Guide to Privacy-Preserving Cryptocurrencies: A Survey on Anonymity, Confidentiality, and Auditability. arXiv 2025, arXiv:2505.21008v1,2025. Available online: https://arxiv.org/abs/2505.21008 (accessed on 22 October 2025).
- Peng, T.; Gong, B.; Tu, S.; Namoun, A.; Alshmrany, S.; Waqas, M.; Alasmary, H.; Chen, S. Forward: Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT. Sensors 2024, 24, 7597. [Google Scholar] [CrossRef] [PubMed]
- Lavin, R.; Liu, X.; Mohanty, H.; Norman, L.; Zaarour, G.; Krishnamachari, B. A Survey on the Applications of Zero-Knowledge Proofs. arXiv 2024, arXiv:2408.00243v1. Available online: https://arxiv.org/abs/2408.00243 (accessed on 22 October 2025).
- Central Bank Digital Currencies: Foundational Principles and Core Features. Available online: https://www.bis.org/publ/othp33.pdf (accessed on 22 October 2025).
- Introducing a Framework for Measuring the Quantitative Benefits of Privacy-Enhancing Technologies, Federal Reserve Bank of Cleveland Working Paper Series, August 2024. Available online: https://www.ingentaconnect.com/content/hsp/jpss/2024/00000018/00000004/art00007 (accessed on 22 October 2025).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
