Abstract
In some cases, users need to notify the same information to multiple recipients, with the requirement that these recipients have to send an acknowledgement of receipt. In this paper we present an optimistic protocol for multi-party certified electronic mail. A Trusted Third Party (TTP) can take part in a protocol run, but only in case of exception. Fairness is guaranteed for all parties being involved in a transaction. At the end of a protocol run, every party possesses enough evidence to prove the final state of the exchange. Parties can contact the TTP when they want (without temporal constraints). The presented protocol is the best one in terms of efficiency: only three steps have to be followed in the exchange sub-protocol.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Giuseppe Ateniese, Breno de Medeiros and Michael T. Goodrich: “TRICERT: Distributed Certified E-mail Schemes”; Proceedings of ISOC 2001 Network and Distributed System Security Symposium (NDSS’01), pages 47–56, San Diego, California, February 2001.
N. Asokan, Matthias Schunter and Michael Waidner: “Optimistic protocols for fair exchange”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.
N. Asokan, Victor Shoup and Michael Waidner: “Asynchronous Protocols for Optimistic Fair Exchange”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, California, May 1998.
Feng Bao, Robert H. Deng and W. Mao: “Efficient and practical fair exchange protocols with off-line TTP”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77–85, Oakland, California, May 1998.
Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: “A Fair Protocol for Signing Contracts”; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40–46, January 1990.
Matthew Berry, Andrew Hutchison and Elton Saul: “Predicting the performance of transactional electronic commerce protocols”; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161–175, Amsterdam, The Netherlands, September–October 1999.
Colin Boyd and Peter Kearney: “Exploring Fair Exchange Protocols Using Specification Animation”; Proceedings of Third International Information Security Workshop, ISW 2000, LNCS 1975, Springer Verlag, pages 209–223, Wollongong, Australia, December 2000.
Ivan Bjerre Damgard: “Practical and provably secure release of a secret and exchange of signatures”; Advances in Cryptology-Proceedings of Eurocrypt’93, LNCS 765, Springer Verlag, pages 200–217, Lofthus, Norway, May 1993.
Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: “Practical Protocols for Certified Electronic Mail”; Journal of Network and Systems Management, Vol. 4, n. 3, pages 279–297, September 1996.
Matthew K. Franklin and Michael K. Reiter: “Fair exchange with a semi-trusted third party”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.
Olivier Markowitch and Steve Kremer: “A Multi-party Optimistic Non-repudiation Protocol”; Proceedings of Third International Conference on Information Security and Cryptology, ICISC 2000, LNCS 2015, Springer Verlag, pages 109–122, Seoul, Korea, December 2000.
Tatsuaki Okamoto and Kazuo Ohta: “How to simultaneously exchange secrets by general assumptions”; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14–28, Fairfax, Virginia, November 1994.
Ronald L. Rivest, Adi Shamir and Leonard M. Adleman: “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”; Communications of the ACM, 21(2), pages 120–126, 1978.
Jianying Zhou, Robert Deng and Feng Bao: “Some Remarks on a Fair Exchange Protocol”; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46–57, Melbourne, Victoria, Australia, January 2000.
Jianying Zhou and Dieter Gollmann: “A Fair Non-repudiation Protocol”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 55–61, Oakland, California, May 1996.
Jianying Zhou and Dieter Gollmann: “An Efficient Non-repudiation Protocol”; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, June 1997.
Josep L. Ferrer, Magdalena Payeras and Llorenç Huguet: “An Efficient Protocol for Certified Electronic Mail”; Proceedings of Third International Information Security Workshop, ISW 2000, LNCS 1975, Springer Verlag, pages 237–248, Wollongong, Australia, December 2000.
Josep L. Ferrer, Magdalena Payeras and Llorenç Huguet: “Efficient Optimistic N-Party Contract Signing Protocol”; Proceedings of Fourth International Information Security Conference, ISC 2001, LNCS 2200, Springer Verlag, pages 394–407, Málaga, Spain, October 2001.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ferrer-Gomila, J.L., Payeras-Capellá, M., Huguet-Rotger, L. (2002). A Realistic Protocol for Multi-party Certified Electronic Mail. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_16
Download citation
DOI: https://doi.org/10.1007/3-540-45811-5_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44270-7
Online ISBN: 978-3-540-45811-1
eBook Packages: Springer Book Archive