Controlling Spam by Secure Internet Content Selection

  • Amir Herzberg
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3352)


Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy (including encrypted e-mail) and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls.


Message Authentication Code Commitment Scheme Original Message Correct Label Mail Server 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236–247. Springer, Heidelberg (1995), Google Scholar
  2. 2.
    The Coordinated Spam Reduction Initiative, Microsoft corporation (February 2004)Google Scholar
  3. 3.
    DesAutels, P. (ed.): Yang-hua Chu, Brian LaMacchia and Peter Lipp, PICS Signed Labels (DSig) 1.0 Specification, W3C Recommendation (May 1998),
  4. 4.
    Duchovni, V., Gilmore, J., Herzberg, A., Laurie, B., Metzger, P.: others, messages to the list (January 2004)Google Scholar
  5. 5.
    Dwork, C., Goldberg, A., Naor, M.: On Memory-Bound Functions for Fighting Spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  6. 6.
    Dwork, C., Naor, M.: Pricing via Processing or Combating Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)Google Scholar
  7. 7.
    Gabber, E., Jakobsson, M., Matias, Y., Mayer, A.: Curbing junk E-mail via secure classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  8. 8.
    Herzberg, A.: Micropayments. In: Kou, W. (ed.) Payment Technologies for E-Commerce, pp. 245–280. Springer, Heidelberg (2003)Google Scholar
  9. 9.
    Herzberg, A.: Controlling spam by secure internet content selection (full version) (in preparation)Google Scholar
  10. 10.
    McCurley, K.: Deterrence Measures for Spam. In: presented at the RSA Conference (January 1998)Google Scholar
  11. 11.
    Miller, J. (ed.): Tim Krauskopf, Paul Resnick and Win Treese, PICS Label Distribution Label Syntax and Communication Protocols Version 1.1, W3C Recommendation (October 1996),
  12. 12.
    Miller, J. (ed.): Paul Resnick and David Singer, Rating Services and Rating Systems and Their Machine Readable Descriptions Version 1.1, W3C Recommendation (October 1996),
  13. 13.
    Ramsdell, B. (ed.): Request for comments 2633, S/MIME Version 3 Message Specification (June 1999)Google Scholar
  14. 14.
    Crocker, D.: Request For Comments 822, Standard for the Format of ARPA Internet Text Messages (August 1982),
  15. 15.
    Schiavone, V., Brussin, D., Koenig, J., Cobb, S., Everett-Church, R.: Trusted Email Open Standard - A Comprehensive Policy and Technology Proposal for Email Reform, An ePrivacy Group White Paper (May 2003), available at
  16. 16.
    Schwartz, A., Garfinkel, S.: Stopping Spam. O’Reilly & Associates, Sebastopol (1998)Google Scholar
  17. 17.
    Technical responses to spam, Taughnnock Networks whitepaper (November 2003)Google Scholar
  18. 18.
    An overview of E-Postage, Taughnnock Networks whitepaper (June 2003), Updated (February 2004)Google Scholar
  19. 19.
    Zimmerman, P.R.: The Official PGP User’s Guide. MIT Press, Boston (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Amir Herzberg
    • 1
  1. 1.Computer Science DepartmentBar Ilan UniversityRamat GanIsrael

Personalised recommendations