Advertisement

An Efficient Protocol for Certified Electronic Mail

  • Josep Lluís Ferrer-Gomila
  • Magdalena Payeras-Capellà
  • Llorenç Huguet i Rotger
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1975)

Abstract

Certified electronic mail is a kind of fair exchange of values: a message for a receipt. An exchange is fair if at the end of the exchange, either each party receives the item it expects or neither party receives any useful information about the other’s item. Fairness can be achieved through the involvement of a trusted third party (TTP). It is very interesting (and practical) the optimistic approach of involving a third party only in the case of exceptions: one party cannot obtain the expected item from the other party. Previous solutions using this approach implicitly assumed that players had reliable communication channels to the third party [2]. In this paper, we present an efficient (only three steps, the minimum), optimistic and fair protocol for certified electronic mail.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    N. Asokan, Matthias Schunter and Michael Waidner: “Optimistic protocols for fair exchange”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.Google Scholar
  2. 2.
    N. Asokan, Victor Shoup and Michael Waidner: “Asynchronous Protocols for Optimistic Fair Exchange”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, CA, May 1998.Google Scholar
  3. 3.
    Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: “A Fair Protocol for Signing Contracts”; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40–46, January 1990.CrossRefGoogle Scholar
  4. 4.
    F. Bao, Robert H. Deng and W. Mao: “Efficient and practical fair exchange protocols with off-line TTP”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77–85, Oakland, CA, May 1998.Google Scholar
  5. 5.
    Alireza Bahreman and J.D. Tygar: “Certified Electronic Mail”; Proceedings of Symposium on Network and Distributed Systems Security, Internet Society, San Diego, California, pages 3–19, February 1994.Google Scholar
  6. 6.
    David H. Crocker: “Standard for the format of ARPA Internet text messages”; Internet RFC-822, August 1982.Google Scholar
  7. 7.
    T. Coffey and P. Saidha: “Non-repudiation with mandatory proof of receipt”; Computer Communication Review, 26(1):6–17, January 1996.CrossRefGoogle Scholar
  8. 8.
    Benjamin Cox, J.D. Tygar and Marvin Sirbu: “NetBill security and transaction protocol”; Proceedings of the First USENIX Workshop on Electronic Commerce, pages 77–88, New York, July 1995.Google Scholar
  9. 9.
    Ivan Bjerre Damgard: “Practical and provably secure release of a secret and exchange of signatures”; Advances in Cryptology-Proceedings of Eurocrypt’93, LNCS 765, pages 200–217, Springer Verlag, (Lofthus, Norway), May 1993.Google Scholar
  10. 10.
    Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: “Practical Protocols for Certified Electronic Mail”; Journal of Network and Systems Management, Vol. 4, n°. 3, pages 279–297, September 1996.CrossRefGoogle Scholar
  11. 11.
    Josep L. Ferrer, Llorenç Huguet and Macià Mut: “Protocolo de Correo Electrönico Certificado”; Proceedings of V Reunión Española de Criptología, Málaga, 1998.Google Scholar
  12. 12.
    Matthew K. Franklin and Michael K. Reiter: “Fair exchange with a semi-trusted third party”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.Google Scholar
  13. 13.
    Josep L. Ferrer, Ángel Rotger and Llorenç Huguet: “Firma electrónica de contratos”; Proceedings of III Reunión Española de Criptología, Barcelona (Spain), 1994.Google Scholar
  14. 14.
    ISO/IEC DIS 13888-1: “Information technology-Security techniques-Non-repudiation-Part 1: General model”; ISO/IEC JTC1/SC27 N1503, October 1996.Google Scholar
  15. 15.
    ISO/IEC DIS 13888-3: “Information technology-Security techniques-Non-repudiation-Part 3: Using asymmetric techniques”; ISO/IEC JTC1/SC27 N1507, October 1996.Google Scholar
  16. 16.
    ISO/IEC DIS 13888-2: “Information technology-Security techniques-Non-repudiation-Part 2: Mechanisms using symmetric techniques”; ISO/IEC JTC1/SC27 N1679, April 1997.Google Scholar
  17. 17.
    J.L. Ferrer and L. Huguet: “An Efficient Asynchronous Protocol for Optimistic Certified Electronic Mail”; International Workshop on Cryptographic Techniques & E-commerce, Hong Kong, July 1999.Google Scholar
  18. 18.
    Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone: Handbook of applied cryptography; CRC Press, 1996.Google Scholar
  19. 19.
    T. Okamoto and K. Ohta: “How to simultaneously exchange secrets by general assumptions”; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14–28, Fairfax, Virginia, November 1994.Google Scholar
  20. 20.
    Jonathan B. Postel: “Simple mail transfer protocol”; Internet RFC-821, August 1982.Google Scholar
  21. 21.
    Charles P. Pfleeger: Security in Computing; Revised Edition, Prentice-Hall, 1997.Google Scholar
  22. 22.
    Macià Mut, Josep L. Ferrer and Llorenç Huguet: “Certified Electronic Mail Protocol Resistant to a Minority of Malicious Third Parties”; Proceedings of IEEE Infocom 2000, Tel Aviv (Israel), March 2000.Google Scholar
  23. 23.
    R. Rivest, A. Shamir and L. Adleman: “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”; Communications of the ACM, 21, pages 120–126, 1978.zbMATHCrossRefMathSciNetGoogle Scholar
  24. 24.
    ITU-T: “Recommendation X.400: Message handling system and service overview”; November 1988, revised July 1996.Google Scholar
  25. 25.
    Jianying Zhou and Dieter Gollmann: “A Fair Non-repudiation Protocol”; Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, Oakland, California, pages 55–61, May 1996.Google Scholar
  26. 26.
    Jianying Zhou and Dieter Gollman: “Certified Electronic Mail”; Advances in Cryptology-Proceedings of ESORICS’96, LNCS-1146, pages 160–171, 1996.Google Scholar
  27. 27.
    Jianying Zhou and Dieter Gollmann: “An Efficient Non-repudiation Protocol”; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, IEEE Computer Society Press, June 1997.Google Scholar
  28. 28.
    Jianying Zhou, Robert Deng and Feng Bao: “Some Remarks on a Fair Exchange Protocol”; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46–57, Melbourne, Victoria, Australia, January 2000.Google Scholar
  29. 29.
    Matthew Berry, Andrew Hutchison and Elton Saul: “Predicting the performance of transactional electronic commerce protocols”; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161–175, Amsterdam, The Netherlands, September 30-October 1, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Josep Lluís Ferrer-Gomila
    • 1
  • Magdalena Payeras-Capellà
    • 1
  • Llorenç Huguet i Rotger
    • 1
  1. 1.Departament de Ciències Matemàtiques i InformàticaUniversitat de les Illes BalearsPalma de MallorcaSpain

Personalised recommendations