Optimized multi-party certified email protocols

نویسندگان

  • Jianying Zhou
  • Jose Antonio Onieva
  • Javier López
چکیده

Purpose – As a value-added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi-party certified email protocols. Design/methodology/approach – Reviews two existing email protocols and provides a modified version to overcome their security flaws and weaknesses. Extends the two-party protocol to a multi-party scenario. Findings – Both of the protocols have three major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. Both the sender and the recipients can end a protocol run at any time without breach of fairness. The exchange protocols are optimized, each of which has only three steps, and the trusted third party will not be involved unless an exception (e.g. a network failure or a party’s misbehavior) occurs. Originality/value – Provides a focus on a value-added service – certified email.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Security of a Multi-party Certified Email Protocol

As a value-added service to deliver important data over the Internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need...

متن کامل

No Author-Based Selective Receipt in Certified Email with Tight Trust Requirements

Kremer and Markowitch introduced in [10] a new property for certified email protocols called no author-based selective receipt, and proposed two new protocols respecting it. In this paper we show that these protocols implicitly require the sender of the email to trust the trusted third party to assure this property. We propose a new protocol in which this trusted third party has only to be trus...

متن کامل

Some common attacks against certified email protocols and the countermeasures

Certified email is a value-added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation receipt showing that the message has been received by the recipient. As far as security is concerned, fairness is the most important requirements, though some other properties are also...

متن کامل

A Power-Aware Multi-Level Cache Organization Effective for Multi-Core Embedded Systems Abu Asaduzzaman Efficient Algorithm for Hardware/Software Partitioning and Scheduling on MPSoC

ID-based public key cryptography is proposed to simplify the management of the certification process and greatly reduce the public key authentication computation as well as communication cost. Certified e-mail protocol is a fair exchange of a message for a receipt between two potentially mistrusting parties over the network. A number of certified e-mail protocols have been studied in recent yea...

متن کامل

TRICERT: A Distributed Certified E-Mail Scheme

In this paper we present protocols for distributed certified e-mail, which use encryption to ensure both confidentiality and fairness. As with other protocols for certified e-mail, ours achieve fairness by placing trust on an external entity, referred to as the Trusted Third Party (TTP). The TTP can become a bottleneck, however, and we explore scenarios that support a distributed TTP, in the co...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Manag. Comput. Security

دوره 13  شماره 

صفحات  -

تاریخ انتشار 2005