Certified electronic mail

  • Jianying Zhou
  • Dieter Gollmann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1146)


This paper examines certified mail delivery in postal systems and derives the essential requirements that may be met by a service called certified electronic mail. Protocols are presented to demonstrate how various flavours of certified electronic mail services may be implemented.


certified electronic mail communications security protocol design 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    N. Borenstein and N. Freed. Multipurpose Internet mail extensions (MIME). RFC 1521, September 1993.Google Scholar
  2. 2.
    CCITT. Recommendation X.400: Message handling system and service overview. November 1988.Google Scholar
  3. 3.
    B. Cox, J. D. Tygar and M. Sirbu. NetBill security and transaction protocol. Proceedings of the First USENIX Workshop on Electronic Commerce, July 1995.Google Scholar
  4. 4.
    D. Crocker. Standard for the format of ARPA Internet text messages. RFC 822, August 1982.Google Scholar
  5. 5.
    S. Crocker, N. Freed, J. Galvin and S. Murphy. MIME object security services. RFC 1848, October 1995.Google Scholar
  6. 6.
    W. Diffie. The impact of a secret cryptographic standard on encryption, privacy, law enforcement and technology. Hearings before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, House of Representatives, One Hundred Third Congress, First Session, Serial No. 103-53, pages 111–116, April 29 and June 9, 1993.Google Scholar
  7. 7.
    S. T. Kent. Internet privacy enhanced mail. Communications of the ACM, 36(8):48–60, August 1993.Google Scholar
  8. 8.
    C. J. Mitchell, M. Walker and D. Rush. CCITT/ISO standards for secure message handling. IEEE Journal on Selected Areas in Communications, 7(4):517–524, May 1989.Google Scholar
  9. 9.
    C. J. Mitchell, D. Rush and M. Walker. A secure message architecture implementing the X.400-1988 security features. The Computer Journal, 33(4):290–295, 1990.Google Scholar
  10. 10.
    J. B. Postel. Simple mail transfer protocol. RFC 821, August 1982.Google Scholar
  11. 11.
    J. B. Postel and J. K. Reynolds. File transfer protocol. RFC 959, October 1985.Google Scholar
  12. 12.
    J. Zhou and D. Gollmann. A fair non-repudiation protocol. Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 55–61, Oakland, CA, May 1996.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • Jianying Zhou
    • 1
  • Dieter Gollmann
    • 1
  1. 1.Department of Computer Science Royal HollowayUniversity of LondonEghamUK

Personalised recommendations