Skip to main content

An Efficient Protocol for Certified Electronic Mail

  • Conference paper
  • First Online:
Information Security (ISW 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1975))

Included in the following conference series:

Abstract

Certified electronic mail is a kind of fair exchange of values: a message for a receipt. An exchange is fair if at the end of the exchange, either each party receives the item it expects or neither party receives any useful information about the other’s item. Fairness can be achieved through the involvement of a trusted third party (TTP). It is very interesting (and practical) the optimistic approach of involving a third party only in the case of exceptions: one party cannot obtain the expected item from the other party. Previous solutions using this approach implicitly assumed that players had reliable communication channels to the third party [2]. In this paper, we present an efficient (only three steps, the minimum), optimistic and fair protocol for certified electronic mail.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. N. Asokan, Matthias Schunter and Michael Waidner: “Optimistic protocols for fair exchange”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.

    Google Scholar 

  2. N. Asokan, Victor Shoup and Michael Waidner: “Asynchronous Protocols for Optimistic Fair Exchange”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, CA, May 1998.

    Google Scholar 

  3. Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: “A Fair Protocol for Signing Contracts”; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40–46, January 1990.

    Article  Google Scholar 

  4. F. Bao, Robert H. Deng and W. Mao: “Efficient and practical fair exchange protocols with off-line TTP”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77–85, Oakland, CA, May 1998.

    Google Scholar 

  5. Alireza Bahreman and J.D. Tygar: “Certified Electronic Mail”; Proceedings of Symposium on Network and Distributed Systems Security, Internet Society, San Diego, California, pages 3–19, February 1994.

    Google Scholar 

  6. David H. Crocker: “Standard for the format of ARPA Internet text messages”; Internet RFC-822, August 1982.

    Google Scholar 

  7. T. Coffey and P. Saidha: “Non-repudiation with mandatory proof of receipt”; Computer Communication Review, 26(1):6–17, January 1996.

    Article  Google Scholar 

  8. Benjamin Cox, J.D. Tygar and Marvin Sirbu: “NetBill security and transaction protocol”; Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77–88, New York, July 1995.

    Google Scholar 

  9. Ivan Bjerre Damgard: “Practical and provably secure release of a secret and exchange of signatures”; Advances in Cryptology-Proceedings of Eurocrypt’93, LNCS 765, pages 200–217, Springer Verlag, (Lofthus, Norway), May 1993.

    Google Scholar 

  10. Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: “Practical Protocols for Certified Electronic Mail”; Journal of Network and Systems Management, Vol. 4, n°. 3, pages 279–297, September 1996.

    Article  Google Scholar 

  11. Josep L. Ferrer, Llorenç Huguet and Macià Mut: “Protocolo de Correo Electrönico Certificado”; Proceedings of V Reunión Española de Criptología, Málaga, 1998.

    Google Scholar 

  12. Matthew K. Franklin and Michael K. Reiter: “Fair exchange with a semi-trusted third party”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.

    Google Scholar 

  13. Josep L. Ferrer, Ángel Rotger and Llorenç Huguet: “Firma electrónica de contratos”; Proceedings of III Reunión Española de Criptología, Barcelona (Spain), 1994.

    Google Scholar 

  14. ISO/IEC DIS 13888-1: “Information technology-Security techniques-Non-repudiation-Part 1: General model”; ISO/IEC JTC1/SC27 N1503, October 1996.

    Google Scholar 

  15. ISO/IEC DIS 13888-3: “Information technology-Security techniques-Non-repudiation-Part 3: Using asymmetric techniques”; ISO/IEC JTC1/SC27 N1507, October 1996.

    Google Scholar 

  16. ISO/IEC DIS 13888-2: “Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques”; ISO/IEC JTC1/SC27 N1679, April 1997.

    Google Scholar 

  17. J.L. Ferrer and L. Huguet: “An Efficient Asynchronous Protocol for Optimistic Certified Electronic Mail”; International Workshop on Cryptographic Techniques & E-commerce, Hong Kong, July 1999.

    Google Scholar 

  18. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of applied cryptography; CRC Press, 1996.

    Google Scholar 

  19. T. Okamoto and K. Ohta: “How to simultaneously exchange secrets by general assumptions”; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14–28, Fairfax, Virginia, November 1994.

    Google Scholar 

  20. Jonathan B. Postel: “Simple mail transfer protocol”; Internet RFC-821, August 1982.

    Google Scholar 

  21. Charles P. Pfleeger: Security in Computing; Revised Edition, Prentice-Hall, 1997.

    Google Scholar 

  22. Macià Mut, Josep L. Ferrer and Llorenç Huguet: “Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties”; Proceedings of IEEE Infocom 2000, Tel Aviv (Israel), March 2000.

    Google Scholar 

  23. R. Rivest, A. Shamir and L. Adleman: “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”; Communications of the ACM, 21, pages 120–126, 1978.

    Article  MATH  MathSciNet  Google Scholar 

  24. ITU-T: “Recommendation X.400: Message handling system and service overview”; November 1988, revised July 1996.

    Google Scholar 

  25. Jianying Zhou and Dieter Gollmann: “A Fair Non-repudiation Protocol”; Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Oakland, California, pages 55–61, May 1996.

    Google Scholar 

  26. Jianying Zhou and Dieter Gollman: “Certified Electronic Mail”; Advances in Cryptology-Proceedings of ESORICS’96, LNCS-1146, pages 160–171, 1996.

    Google Scholar 

  27. Jianying Zhou and Dieter Gollmann: “An Efficient Non-repudiation Protocol”; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, IEEE Computer Society Press, June 1997.

    Google Scholar 

  28. Jianying Zhou, Robert Deng and Feng Bao: “Some Remarks on a Fair Exchange Protocol”; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46–57, Melbourne, Victoria, Australia, January 2000.

    Google Scholar 

  29. Matthew Berry, Andrew Hutchison and Elton Saul: “Predicting the performance of transactional electronic commerce protocols”; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161–175, Amsterdam, The Netherlands, September 30-October 1, 1999.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lluís Ferrer-Gomila, J., Payeras-Capellà, M., Huguet i Rotger, L. (2000). An Efficient Protocol for Certified Electronic Mail. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_18

Download citation

  • DOI: https://doi.org/10.1007/3-540-44456-4_18

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41416-2

  • Online ISBN: 978-3-540-44456-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics