Abstract
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation evidence that the message has been received by the recipient. As far as security is concerned, fairness is one of the most important requirements. Recently, Galdi and Giordano (2004) presented an optimistic protocol for certified e-mail with temporal authentication. In this paper, we analyze their protocol and demonstrate that it cannot achieve true fairness and has some other weaknesses. We further propose the improvements to avoid those security problems.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: Design and implementation. In: Proceedings of 2002 International World Wide Web Conference, pp. 387–395. ACM Press, New York (2002)
Ateniese, G., Medeiros, B.d., Goodrich, M.T.: TRICERT: A distributed certified e-mail scheme. In: Proceedings of 2001 Symposium on Network and Distributed Systems Security, Internet Society (2001)
Bahreman, A., Tygar, J.D.: Certified electronic mail. In: Proceedings of 1994 Symposium on Network and Distributed System Security, pp. 3–19. Internet Society (1994)
Bao, F., Wang, G., Zhou, J., Zhu, H.: Analysis and improvement of Micali’s fair contract signing protocol. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 176–187. Springer, Heidelberg (2004)
Deng, R., Gong, L., Lazar, A., Wang, W.: Practical protocol for certified electronic mail. Journal of Network and Systems Management 4(3), 279–297 (1996)
Ferrer-Gomila, J.L., Payeras-Capella, M., Huguet-Rotger, L.: An efficient protocol for certified electronic mail. In: Okamoto, E., Pieprzyk, J.P., Seberry, J. (eds.) ISW 2000. LNCS, vol. 1975, pp. 237–248. Springer, Heidelberg (2000)
Galdi, C., Giordano, R.: Certified e-mail with temporal authentication: An improved optimistic protocol. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2004. LNCS, vol. 3184, pp. 181–190. Springer, Heidelberg (2004)
Imamoto, K., Sakurai, K.: A certified e-mail system with receiver’s selective usage of delivery authority. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 326–338. Springer, Heidelberg (2002)
Kremer, S., Markowitch, O.: Selective receipt in certified e-mail. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 136–148. Springer, Heidelberg (2001)
Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocol. Computer Communications 25(17), 1606–1621 (2002)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography, October 1996. CRC Press, Boca Raton (1996) ISBN: 0-8493-8523-7
Monteiro, J.R.M., Dahab, R.: An attack on a protocol for certified delivery. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 426–428. Springer, Heidelberg (2003)
Onieva, J.A., Zhou, J., Lopez, J.: Enhancing certified email service for timeliness and multicast. In: Proceedings of 4th International Network Conference, Plymouth, UK, pp. 327–336 (2004)
Oppliger, R.: Certified mail: The next challenge for secure messaging. Communications of the ACM 47(8) (August 2004)
Schneier, B., Riordan, J.: A certified e-mail protocol. In: Proceedings of 1997 Annual Computer Security Applications Conference, pp. 232–238. IEEE computer Society Press, Los Alamitos (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shao, MH., Zhou, J., Wang, G. (2005). On the Security of a Certified E-Mail Scheme with Temporal Authentication. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424857_77
Download citation
DOI: https://doi.org/10.1007/11424857_77
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25862-9
Online ISBN: 978-3-540-32045-6
eBook Packages: Computer ScienceComputer Science (R0)