Skip to main content

A Realistic Protocol for Multi-party Certified Electronic Mail

  • Conference paper
  • First Online:
Information Security (ISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2433))

Included in the following conference series:

Abstract

In some cases, users need to notify the same information to multiple recipients, with the requirement that these recipients have to send an acknowledgement of receipt. In this paper we present an optimistic protocol for multi-party certified electronic mail. A Trusted Third Party (TTP) can take part in a protocol run, but only in case of exception. Fairness is guaranteed for all parties being involved in a transaction. At the end of a protocol run, every party possesses enough evidence to prove the final state of the exchange. Parties can contact the TTP when they want (without temporal constraints). The presented protocol is the best one in terms of efficiency: only three steps have to be followed in the exchange sub-protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Giuseppe Ateniese, Breno de Medeiros and Michael T. Goodrich: “TRICERT: Distributed Certified E-mail Schemes”; Proceedings of ISOC 2001 Network and Distributed System Security Symposium (NDSS’01), pages 47–56, San Diego, California, February 2001.

    Google Scholar 

  2. N. Asokan, Matthias Schunter and Michael Waidner: “Optimistic protocols for fair exchange”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 7–17, Zurich, Switzerland, April 1997.

    Google Scholar 

  3. N. Asokan, Victor Shoup and Michael Waidner: “Asynchronous Protocols for Optimistic Fair Exchange”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 86–99, Oakland, California, May 1998.

    Google Scholar 

  4. Feng Bao, Robert H. Deng and W. Mao: “Efficient and practical fair exchange protocols with off-line TTP”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 77–85, Oakland, California, May 1998.

    Google Scholar 

  5. Michael Ben-Or, Oded Goldreich, Silvio Micali and Ronald L. Rivest: “A Fair Protocol for Signing Contracts”; IEEE Transactions on Information Theory, Vol. 36, n. 1, pages 40–46, January 1990.

    Article  MathSciNet  Google Scholar 

  6. Matthew Berry, Andrew Hutchison and Elton Saul: “Predicting the performance of transactional electronic commerce protocols”; Seventh Annual Working Conference on Information Security Management & Small Systems Security, Kluwer Academic Publishers, pages 161–175, Amsterdam, The Netherlands, September–October 1999.

    Google Scholar 

  7. Colin Boyd and Peter Kearney: “Exploring Fair Exchange Protocols Using Specification Animation”; Proceedings of Third International Information Security Workshop, ISW 2000, LNCS 1975, Springer Verlag, pages 209–223, Wollongong, Australia, December 2000.

    MATH  Google Scholar 

  8. Ivan Bjerre Damgard: “Practical and provably secure release of a secret and exchange of signatures”; Advances in Cryptology-Proceedings of Eurocrypt’93, LNCS 765, Springer Verlag, pages 200–217, Lofthus, Norway, May 1993.

    MATH  Google Scholar 

  9. Robert H. Deng, Li Gong, Aurel A. Lazar and Weiguo Wang: “Practical Protocols for Certified Electronic Mail”; Journal of Network and Systems Management, Vol. 4, n. 3, pages 279–297, September 1996.

    Article  Google Scholar 

  10. Matthew K. Franklin and Michael K. Reiter: “Fair exchange with a semi-trusted third party”; Proceedings of 4th ACM Conference on Computer and Communications Security, pages 1–6, Zurich, Switzerland, April 1997.

    Google Scholar 

  11. Olivier Markowitch and Steve Kremer: “A Multi-party Optimistic Non-repudiation Protocol”; Proceedings of Third International Conference on Information Security and Cryptology, ICISC 2000, LNCS 2015, Springer Verlag, pages 109–122, Seoul, Korea, December 2000.

    MATH  Google Scholar 

  12. Tatsuaki Okamoto and Kazuo Ohta: “How to simultaneously exchange secrets by general assumptions”; Proceedings of IEEE Symposium on Research in Security and Privacy, pages 14–28, Fairfax, Virginia, November 1994.

    Google Scholar 

  13. Ronald L. Rivest, Adi Shamir and Leonard M. Adleman: “A Method for Obtaining Digital Signatures and Public Key Cryptosystems”; Communications of the ACM, 21(2), pages 120–126, 1978.

    Article  MathSciNet  Google Scholar 

  14. Jianying Zhou, Robert Deng and Feng Bao: “Some Remarks on a Fair Exchange Protocol”; Proceedings of Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, LNCS 1751, Springer Verlag, pages 46–57, Melbourne, Victoria, Australia, January 2000.

    MATH  Google Scholar 

  15. Jianying Zhou and Dieter Gollmann: “A Fair Non-repudiation Protocol”; Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 55–61, Oakland, California, May 1996.

    Google Scholar 

  16. Jianying Zhou and Dieter Gollmann: “An Efficient Non-repudiation Protocol”; Proceedings of 10th IEEE Computer Security Foundations Workshop, pages 126–132, Rockport, Massachusetts, June 1997.

    Google Scholar 

  17. Josep L. Ferrer, Magdalena Payeras and Llorenç Huguet: “An Efficient Protocol for Certified Electronic Mail”; Proceedings of Third International Information Security Workshop, ISW 2000, LNCS 1975, Springer Verlag, pages 237–248, Wollongong, Australia, December 2000.

    MATH  Google Scholar 

  18. Josep L. Ferrer, Magdalena Payeras and Llorenç Huguet: “Efficient Optimistic N-Party Contract Signing Protocol”; Proceedings of Fourth International Information Security Conference, ISC 2001, LNCS 2200, Springer Verlag, pages 394–407, Málaga, Spain, October 2001.

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ferrer-Gomila, J.L., Payeras-Capellá, M., Huguet-Rotger, L. (2002). A Realistic Protocol for Multi-party Certified Electronic Mail. In: Chan, A.H., Gligor, V. (eds) Information Security. ISC 2002. Lecture Notes in Computer Science, vol 2433. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45811-5_16

Download citation

  • DOI: https://doi.org/10.1007/3-540-45811-5_16

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44270-7

  • Online ISBN: 978-3-540-45811-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics