An Evenhanded Certified Email System for Contract Signing

  • Kenji Imamoto
  • Jianying Zhou
  • Kouichi Sakurai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3783)


Certified email is a system which enables a sender to prove a receiver’s receipt of email. Such a system can be used for applications related to electronic commerce on the Internet. This paper considers a situation where a sender or a receiver wants to change his/her mind due to the change of mail content value (e.g., stock, auction, gambling) during the transaction. We point out that no traditional certified email systems have been designed for such a case, thus one of the participants can be at a disadvantage. To avoid this problem, we propose an evenhanded certified email system in which each participant can change his/her choice, either cancel or finish the transaction, at any time during the transaction.


  1. 1.
    Onieva, J.A., Zhou, J., Lopez, J.: Enhancing Certified Email Service for Timeliness and Multicasting. In: INC 2004 (2004)Google Scholar
  2. 2.
    Kremer, S., Markowitch, O.: Selective Receipt in Certified email. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, p. 136. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Ateniese, G., Medeiros, B., Goodrich, M.T.: TRICERT: A Distributed Certified email Scheme. In: NDSS 2001 (2001)Google Scholar
  4. 4.
    Markowitch, O., Kremer, S.: An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party. In: Davida, G.I., Frankel, Y. (eds.) ISC 2001. LNCS, vol. 2200, p. 363. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Ateniese, G., Rotaru, C.N.: Stateless-Recipient Certified Email System based on Verifiable Encryption. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol. 2271, p. 182. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified Email with a Light On-line Trusted Third Party: Design and Implementation. In: WWW 2002 (2002)Google Scholar
  7. 7.
    Markle, R.: Secure Communications over Insecure Channels. Communications of the ACM 21, 294–299 (1978)CrossRefGoogle Scholar
  8. 8.
    Buttyan, L., Hubaux, J.-P.: Toward a Formal Model of Fair Exchange - a Game Theoretic Approach. EPFL SSC Technical Report No. SSC/1999/039Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Kenji Imamoto
    • 1
  • Jianying Zhou
    • 2
  • Kouichi Sakurai
    • 1
  1. 1.Information Science and Electrical EngineeringKyushu UniversityFukuokaJapan
  2. 2.Institute for Infocomm ResearchSingapore

Personalised recommendations