Abstract
Certified electronic mail is a kind of fair exchange of values: a message for a receipt. An exchange is fair if at the end of the exchange, either each party receives the item it expects or neither party receives any useful information about the other’s item. Fairness can be achieved through the involvement of a trusted third party (TTP). It is very interesting (and practical) the optimistic approach of involving a third party only in the case of exceptions: one party cannot obtain the expected item from the other party. Previous solutions using this approach implicitly assumed that players had reliable communication channels to the third party [2]. In this paper, we present an efficient (only three steps, the minimum), optimistic and fair protocol for certified electronic mail.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
N. Asokan, Matthias Schunter and Michael Waidner: “Optimistic protocols for fair exchange”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.
N. Asokan, Victor Shoup and Michael Waidner: “Asynchronous Protocols for Optimistic Fair Exchange”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, CA, May 1998.
Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: “A Fair Protocol for Signing Contracts”; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40–46, January 1990.
F. Bao, Robert H. Deng and W. Mao: “Efficient and practical fair exchange protocols with off-line TTP”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77–85, Oakland, CA, May 1998.
Alireza Bahreman and J.D. Tygar: “Certified Electronic Mail”; Proceedings of Symposium on Network and Distributed Systems Security, Internet Society, San Diego, California, pages 3–19, February 1994.
David H. Crocker: “Standard for the format of ARPA Internet text messages”; Internet RFC-822, August 1982.
T. Coffey and P. Saidha: “Non-repudiation with mandatory proof of receipt”; Computer Communication Review, 26(1):6–17, January 1996.
Benjamin Cox, J.D. Tygar and Marvin Sirbu: “NetBill security and transaction protocol”; Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77–88, New York, July 1995.
Ivan Bjerre Damgard: “Practical and provably secure release of a secret and exchange of signatures”; Advances in Cryptology-Proceedings of Eurocrypt’93, LNCS 765, pages 200–217, Springer Verlag, (Lofthus, Norway), May 1993.
Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: “Practical Protocols for Certified Electronic Mail”; Journal of Network and Systems Management, Vol. 4, n°. 3, pages 279–297, September 1996.
Josep L. Ferrer, Llorenç Huguet and Macià Mut: “Protocolo de Correo Electrönico Certificado”; Proceedings of V Reunión Española de Criptología, Málaga, 1998.
Matthew K. Franklin and Michael K. Reiter: “Fair exchange with a semi-trusted third party”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.
Josep L. Ferrer, Ángel Rotger and Llorenç Huguet: “Firma electrónica de contratos”; Proceedings of III Reunión Española de Criptología, Barcelona (Spain), 1994.
ISO/IEC DIS 13888-1: “Information technology-Security techniques-Non-repudiation-Part 1: General model”; ISO/IEC JTC1/SC27 N1503, October 1996.
ISO/IEC DIS 13888-3: “Information technology-Security techniques-Non-repudiation-Part 3: Using asymmetric techniques”; ISO/IEC JTC1/SC27 N1507, October 1996.
ISO/IEC DIS 13888-2: “Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques”; ISO/IEC JTC1/SC27 N1679, April 1997.
J.L. Ferrer and L. Huguet: “An Efficient Asynchronous Protocol for Optimistic Certified Electronic Mail”; International Workshop on Cryptographic Techniques & E-commerce, Hong Kong, July 1999.
Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of applied cryptography; CRC Press, 1996.
T. Okamoto and K. Ohta: “How to simultaneously exchange secrets by general assumptions”; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14–28, Fairfax, Virginia, November 1994.
Jonathan B. Postel: “Simple mail transfer protocol”; Internet RFC-821, August 1982.
Charles P. Pfleeger: Security in Computing; Revised Edition, Prentice-Hall, 1997.
Macià Mut, Josep L. Ferrer and Llorenç Huguet: “Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties”; Proceedings of IEEE Infocom 2000, Tel Aviv (Israel), March 2000.
R. Rivest, A. Shamir and L. Adleman: “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”; Communications of the ACM, 21, pages 120–126, 1978.
ITU-T: “Recommendation X.400: Message handling system and service overview”; November 1988, revised July 1996.
Jianying Zhou and Dieter Gollmann: “A Fair Non-repudiation Protocol”; Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Oakland, California, pages 55–61, May 1996.
Jianying Zhou and Dieter Gollman: “Certified Electronic Mail”; Advances in Cryptology-Proceedings of ESORICS’96, LNCS-1146, pages 160–171, 1996.
Jianying Zhou and Dieter Gollmann: “An Efficient Non-repudiation Protocol”; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, IEEE Computer Society Press, June 1997.
Jianying Zhou, Robert Deng and Feng Bao: “Some Remarks on a Fair Exchange Protocol”; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46–57, Melbourne, Victoria, Australia, January 2000.
Matthew Berry, Andrew Hutchison and Elton Saul: “Predicting the performance of transactional electronic commerce protocols”; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161–175, Amsterdam, The Netherlands, September 30-October 1, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lluís Ferrer-Gomila, J., Payeras-Capellà, M., Huguet i Rotger, L. (2000). An Efficient Protocol for Certified Electronic Mail. In: Goos, G., Hartmanis, J., van Leeuwen, J., Pieprzyk, J., Seberry, J., Okamoto, E. (eds) Information Security. ISW 2000. Lecture Notes in Computer Science, vol 1975. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44456-4_18
Download citation
DOI: https://doi.org/10.1007/3-540-44456-4_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41416-2
Online ISBN: 978-3-540-44456-5
eBook Packages: Springer Book Archive