Advertisement

Journal of Cryptology

, Volume 3, Issue 2, pp 137–146 | Cite as

CRYPTOPOST A cryptographic application to mail processing

  • José Pastor
Article

Abstract

A public key cryptography protocol is designed for the authentication of documents. When applied to the authentication of postage on mail envelopes it permits the development of a universal automated and standardized mail processing and postage verification system. The mail processing automation problem is present, and the protocol solution and characteristics of the proposed cryptographic CRYPTOPOST system are described. Partial details of one implementation are disclosed.

Key words

Digital signatures Authentication of documents Public key Cryptosystem 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    S. Even, O. Goldreich, and S. Micali. On-line, Off-line Digital Signatures. In Advances in Cryptology—CRYPTO '89, G. Brassard (ed.). Lecture Notes in Computer Science, Vol. 435. Springer-Verlag, Berlin, 1990, pp. 263–275.Google Scholar
  2. [2]
    R. W. Hamming. Coding and Information Theory. Prentice-Hall, Englewood Cliffs, NJ, 1980.Google Scholar
  3. [3]
    J. Pastor. Reliable Document Authentication System. US Patent 4, 853, 961, August 1, 1989.Google Scholar
  4. [4]
    J. Pastor. CRYPTOPOST. A Universal Information-Based Franking System for Automated Mail Processing. In Proceedings of Fourth Advanced Technology Conference of the U.S. Postal Service, Washington, DC, November 5–7, 1990, Vol. I, pp. 429–442.Google Scholar
  5. [5]
    W. W. Peterson and E. J. Weldon. Error-Correcting Codes, 2nd ed. MIT Press, Cambridge, MA, 1972.Google Scholar

Copyright information

© International Association for Cryptologic Research 1991

Authors and Affiliations

  • José Pastor
    • 1
  1. 1.Technical Systems and Advanced Products DivisionPitney Bowes CorporationStamfordUSA

Personalised recommendations