Accountable Anonymous E-Mail
نویسندگان
چکیده
Current anonymous e-mail systems offer unconditional anonymity to their users which can provoke abusive behaviour. Dissatisfied users will drop out and liability issues may even force the system to suspend or cease its services. Therefore, controlling abuse is as important as protecting the anonymity of legitimate users when designing anonymous applications. This paper describes the design and implementation AAEM, an accountable anonymous e-mail system. An existing anonymous e-mail system is enhanced with a control mechanism that allows for accountability. The system creates a trusted environment for senders, recipients and system operators. It provides a reasonable trade-off between anonymity, accountability, usability and flexibility.
منابع مشابه
An Anonymous but Accountable Proxy Multi-signature Scheme
in a proxy multi-signature, the proxy signer can sign a message on behalf of more than one original signer. However, in some cases, the proxy or the original signers do not want to leak the proxy signer's identity. In addition, when something is wrong with the signed message, the identity of the proxy signer has to be revealed. So the problem of anonymous but accountable has been proposed. Usin...
متن کاملAccountable Anonymous Access to Services in Mobile Communication Systems
We introduce a model that allows anonymous yet accountable access to services in mobile communication systems. This model is based on the introduction of a new business role, called the customer care agency, and a ticket based mechanism for service access. We introduce the general idea of ticket based service access, and present a categorisation of ticket types and ticket acquisition models. We...
متن کاملA New Anonymous but Accountable Secure Proxy Signature Scheme
Privacy has become one of the most important human rights of the modern age. In order to verify the validity of the proxy signature, the verifier need get the original signers’ public key and the proxy signer’s public key. Obviously, the verification would leak the relationship between the proxy signer and the original signer. Using the technology of pseudonym, in this paper, we propose a simpl...
متن کاملMining writeprints from anonymous e-mails for forensic investigation
Many criminals exploit the convenience of anonymity in the cyber world to conduct illegal activities. E-mail is the most commonly used medium for such activities. Extracting knowledge and information from e-mail text has become an important step for cybercrime investigation and evidence collection. Yet, it is one of the most challenging and timeconsuming tasks due to special characteristics of ...
متن کاملHow to Make Personalized Web Browsing Simple Secure and Anonymous
An increasing number of web sites require users to establish an account before they can access the information stored on that site personalized web browsing Typically the user is required to provide at least a unique username a secret password and an e mail address Establishing accounts at multiple web sites is a tedious task A security and privacy aware user may have to invent a distinct usern...
متن کامل