Advertisement

Enforcing Email Addresses Privacy Using Tokens

  • Roman Schlegel
  • Serge Vaudenay
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3822)

Abstract

We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the SPAM phenomenon. Our solution does not require changes to the email infrastructure, can be set up by the end user on an individual basis and is compatible with any email client as long as emails are centralized on a server (e.g. an IMAP server). Nevertheless, it requires that people use email messaging quite differently.

Keywords

Email Message Token Distributor Elliptic Curve Digital Signature Algorithm Outgoing Message Federal Information Processing Standard 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    ANSI X9.62. Public Key Cryptography for the Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA). American National Standard Institute. American Bankers Association (1998)Google Scholar
  2. 2.
    Digital Signature Standard (DSS). Federal Information Processing Standards publication #186-2. U.S. Department of Commerce, National Institute of Standards and Technology (2000)Google Scholar
  3. 3.
    von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Dwork, C., Goldberg, A.V., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Gentry, C., Ramzan, Z., Stubblebine, S.: Secure Distributed Human Computation. In: Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), Vancouver, Canada, pp. 155–164. ACM Press, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Roman, R., Zhou, J., Lopez, J.: Protection against Spam using Pre-Challenges. In: Security and Privacy in the Age of Ubiquitous Computing IFIP TC11 20th International Information Security Conference (SEC 2005), Chiba, Japan, pp. 281–293. Springer, Heidelberg (2005)Google Scholar
  7. 7.
    Delany, M. (Eds.). Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys). IETF Draft (2005)Google Scholar
  8. 8.
    Harris, E.: The Next Step in the Spam Control War: Greylisting (2003), http://www.greylisting.org/articles/whitepaper.shtml
  9. 9.
    Ioannidis, J.: Fighting Spam by Encapsulating Policy in Email Addresses. In: Symposium of Network and Distributed Systems Security (NDSS) 2003, San Diego, California (February 2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Roman Schlegel
    • 1
  • Serge Vaudenay
    • 1
  1. 1.EPFLLausanneSwitzerland

Personalised recommendations