Revocation of unread e-mail in an untrusted network

Network Security
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1270)


We present protocols for enhancing e-mail systems to allow for secure revocation of messages. This paper identifies the security requirements for e-mail revocation and then shows how our protocols adhere to these requirements. Three different levels of security and threat models are described. We discuss our implementation of the level 1 protocol, which assumes no security infrastructure. The protocols were designed so that existing mailers can easily be enhanced with these new features.


Shared Secret Security Requirement Electronic Mail Random String Incoming Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    David Chaum. Untraceable electronic mail, return adresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.CrossRefGoogle Scholar
  2. 2.
    D. Eastlake, S. Crocker, and J. Schiller. Randomness recommendations for security. RFC 1750, December 1994.Google Scholar
  3. 3.
    Ceki Gulcu and Gene Tsudik. Mixing E-mail with BABEL. Symposium on Network and Distributed System Security, pages 2–16, February 1996.Google Scholar
  4. 4.
    MTS volume 23: Messaging and conferencing in MTS, February 1991.Google Scholar
  5. 5.
    National Bureau of Standards. Data encryption standard. Federal Information Processing Standards Publication, 1(46), 1977.Google Scholar
  6. 6.
    R. Rivest. The md5 message digest algorithm. RFC 1321, April 1992.Google Scholar
  7. 7.
    A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, November 1979.CrossRefGoogle Scholar
  8. 8.
    Douglas Stinson. Cryptography: Theory and Practice. CRC Press, Inc, 1995.Google Scholar
  9. 9.
    Domestic mail manual, September 1995.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  1. 1.AT&T LabsMurray Hill
  2. 2.BellcoreMorristown
  3. 3.Computer Science DeptM.I.TCambridge

Personalised recommendations