Information | Merchant | Consumer | Date | Amount | Item |
Party | |||||
Merchant | Full | None | Full | Full | Full |
Consumer | Full | Full | Full | Full | Full |
Bank | Full | None | Full | Full | None |
Transaction Log | Full | None | Full | None | None |
Law Enforcement | |||||
w/warrant | Full | None | Full | Full | Full |
Electronic | |||||
Observer | Partial | None | Full | Partial | None |
An important consideration in any transaction is what information is revealed about the participants and to whom. In this section, with the aid of a table, we detail what information is obtained by various agents.
Table 1 gives the types of information available to various parties in the style of [4]. The entries for the merchant, the consumer, the bank, and the transaction log are based on their original information plus any information received over the course of a transaction. The information for law enforcement with warrant assumes record-keeping on the part of the bank, and law enforcement's knowledge of the item is dependent on merchant records. The electronic observer's knowledge is based upon performing traffic analysis on the encrypted messages. In the basic protocol, the transaction log is publicly readable, and thus an observer can also obtain full information about the merchant's identity.