Correcting Privacy Violations in Blind-Carbon-Copy (BCC) Encrypted Email
نویسندگان
چکیده
We show that many widely deployed email encryption systems reveal the identities of BlindCarbon-Copy (BCC) recipients. For example, encrypted email sent using Microsoft Outlook completely exposes the identity of every BCC recipient. Additionally, several implementations of PGP expose the full name and email address of BCC recipients. In this paper, we present a number of methods for providing BCC privacy while preserving the existing semantics of email. Our constructions use standard public key systems such as RSA and ElGamal and suggest that BCC privacy can be implemented efficiently without changing the underlying broadcast semantics of the email system.
منابع مشابه
Secure E-Mail Messaging to Selected Group Members Using PGP Technique
The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time using To(Original recipient) ,Cc(Carbon Copy) and /or Bcc(Blind Carbon copy) facilities. Although the security of the important E-mail messages is an important issue, no such security is supported by the Internet standards. Recently one well known ...
متن کاملA Common Knowledge in Email Exchanges
Email is by now a prevalent form of communication. From the point of view of distributed programming it looks superficially as an instance of multicasting —one agent sends a message to a group of agents. However, such features as forwarding and the blind carbon copy (BCC) make it a more complex form of communication. The reason is that each email implicitly carries epistemic information concern...
متن کاملProceedings of the Workshop “ Reasoning About Other Minds : Logical and Cognitive Perspectives ”
We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. Then we clarify when a group of agents acquires common knowledge of the formula expressing that an email was sent.
متن کاملOff-the-record Email System
In the flood of communications now carried via email, it frequently happens that users want to keep some casual or sensitive exchanges off the record, just as in ordinary telephone conversations. Within the system architectures commonly in use today, however, virtually all email transmissions leave a permanent record behind a paper trail that is extremely difficult to obliterate. Even after an ...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کامل