Reactively Simulatable Certified Mail

نویسندگان

  • Birgit Pfitzmann
  • Matthias Schunter
  • Michael Waidner
چکیده

Certified mail is the fair exchange of a message for a receipt, i.e., the recipient gets the message if and only if the sender gets a receipt. It is an important primitive for electronic commerce and other atomicity services. Certified-mail protocols are known in the literature, but there was no rigorous definition yet, in particular for optimistic protocols and for many interleaved executions. We provide such a definition via an ideal system and show that a specific real certified-mail protocol is as secure as this ideal system in the sense of reactive simulatability in the standard model of cryptography and under standard assumptions. As certified mail without any third party is not practical, we consider optimistic protocols, which involve a third party only if one party tries to cheat. The real protocol resembles prior protocols, but we had to use a different cryptographic primitive to achieve simulatability. The communication model is synchronous. This proof first demonstrated that a cryptographic multi-step protocol can fulfil a general definition of reactive simulatability enabling concurrent composition. We also first showed how formal-method style reasoning can be applied over the ideal system in a cryptographically sound way. Moreover, the treatment of multiple protocol runs and their modular proof in spite of the use of common cryptographic primitives for all runs can be seen as a first example of what is now known as joint-state composition.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A randomized trial of the impact of certified mail on response rate to a physician survey, and a cost-effectiveness analysis.

This study's goals were to (a) determine whether sending a survey by certified mail results in a higher response rate from physicians compared to sending by first-class mail and (b) evaluate the cost-effectiveness of this method. The study sample was 409 physicians who were nonrespondents to two previous mailings of a medical specialty society survey. Eligible physicians were designated at rand...

متن کامل

Selective Receipt in Certified E-mail

Traditional pen and paper transactions are becoming more and more replaced by equivalent electronic services. Therefore electronic e-mail should also provide enhanced services as those provided by traditional mail. In this paper we present new optimistic protocols for certified e-mail. The major contribution of our paper is the definition of a new property, specific to certified e-mail: no auth...

متن کامل

Design and Implementation of an Inline Certified E-mail Service

Nowadays, e-mail has become one of the most widely used communication medium. Because of its characteristics of inexpensivity and rapidity in the delivery of messages, e-mail is increasingly used in place of ordinary mail. However, the e-mail service exposes users to several risks related to the lack of security during the message exchange. Furthermore, regular mail offers services which are us...

متن کامل

Efficient and Secure Protocol in Fair Certified E-Mail Delivery

An efficient and secure protocol in certified e-mail delivery is proposed in this paper. With the widespread use of public Internet, communication via electronic mail (e-mail) becomes a convenience application instead of traditional manuscript letter. People can easily append his/her digital signature to the email in order to achieve the goal of non-repudiation of origin. However, the evidence ...

متن کامل

On the Security of a Certified E-Mail Scheme with Temporal Authentication

Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation evidence that the message has been received by the recipient. As far as security is concerned, fairness is one of the most important requirements. Recently, Galdi and Giordano (2004) presented an optimistic pro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006