The protocols presented in this paper form the groundwork for many variations which alter or extend their functionality. In this section we describe modifications to support key reuse, multiple token transactions, partial token spending, cryptographic time-stamps, a non-public transaction log, and full certified delivery.