Abstract
We introduce a new method and system to curb junk e-mail by employing extended e-mail addresses. It enables a party to use her (core) e-mail address with different extensions and consequently classify incoming e-mail messages according to the extension they were sent to. Our contributions are threefold: First, we identify the components of a system that realizes the concept of extended e-mail addresses and investigate the functionality of these components in a manner which is backwards compatible to current e-mail tools. Secondly, we specify an adversarial model, and give the necessary properties of extended e-mail addresses and of the procedure to obtain them in the presence of the adversary. Finally, we design cryptographic functions that enable realizing extended e-mail addresses which satisfy these properties.
Preview
Unable to display preview. Download preview PDF.
References
D. Bleichenbacher, E. Gabber, P. Gibbons, Y. Matias, A. Mayer, On Secure and Pseudonymous Client-Relationships with Multiple Servers, submitted, also available at url http://www.bell-labs.com/projects/lpwa/papers.html.
N.S. Borenstein and C.A. Thyberg, Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System, International Journal of Man-Machine Studies, Volume 34, Number 2, February 1991, pp. 229–259.
L.F. Cranor and B.A. LaMacchia, Spam!, to appear in Communications of the ACM. Also available at url http://www.research.att.com/~lorrie/pubs/spam/.
C. Dwork and M. Naor, Pricing via Processing or Combating Junk Mail, Crypto'92, pp. 139–147.
M. Franklin and D. Malkhi, Auditable Metering with Lightweight Security, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 151–160.
E. Gabber, P. Gibbons, Y. Matias, A. Mayer, How to Make Personalized Web Browsing Simple, Secure, and Anonymous, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 17–31. Also available at url http://www.bell-labs.com/projects/lpwa/papers.html.
R.J. Hall, Channels: Avoiding Unwanted Electronic Mail, to appear in Communications of the ACM. Also available at url ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps.
LPWA: The Lucent Personalized Web Assistant, A Bell Labs Technology Demonstration. Available at url http://lpwa.com.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gabber, E., Jakobsson, M., Matias, Y., Mayer, A. (1998). Curbing junk e-mail via secure classification. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055484
Download citation
DOI: https://doi.org/10.1007/BFb0055484
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64951-9
Online ISBN: 978-3-540-53918-6
eBook Packages: Springer Book Archive