On the Security of a Multi-party Certified Email Protocol
- 702 Downloads
As a value-added service to deliver important data over the Internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. But most of them deal with the two-party scenarios, i.e., there are only one sender and one recipient. In some applications, however, the same certified message may need to be sent to a set of recipients. In ISC’02, Ferrer-Gomila et. al presented a multi-party certified email protocol . It has two major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. In addition, its exchange protocol is optimized, which has only three steps. In this paper, we demonstrate some flaws and weaknesses in that protocol, and propose an improved version which is robust against the identified attacks while preserving the features of the original protocol.
Keywordscertified email non-repudiation security protocol
Unable to display preview. Download preview PDF.
- 1.Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified email with a light on-line trusted third party: Design and implementation. In: Proceedings of 2002 International World Wide Web Conference, Honolulu, Hawaii, May 2002, pp. 387–395 (2002)Google Scholar
- 2.Ateniese, G., Medeiros, B., Goodrich, M.: TRICERT: Distributed certified email schemes. In: Proceedings of 2001 Network and Distributed System Security Symposium, San Diego, California (February 2001)Google Scholar
- 6.Kremer, S., Markowitch, O.: A multi-party non-repudiation protocol. In: Proceedings of 15th IFIP International Information Security Conference, Beijing, China, August 2000, pp. 271–280 (2000)Google Scholar
- 8.Mut-Puigserver, M., Ferrer-Gomila, J., Huguet-Rotger, L.: Certified electronic mail protocol resistant to a minority of malicious third parties. In: Proceedings IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000, vol. 3, pp. 1401–1405 (2000)Google Scholar
- 9.Wang, G., Bao, F., Zhou, J.: Security analysis of a certified email scheme. manuscript, Institute for Infocomm Research, Singapore (2004)Google Scholar
- 10.Zhou, J., Gollmann, D.: A fair non-repudiation protocol. In: Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, California, May 1996, pp. 55–61 (1996)Google Scholar
- 11.Zhou, J., Gollmann, D.: Certified electronic mail. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 160–171. Springer, Heidelberg (1996)Google Scholar