Skip to main content

A Shared Certified Mail System for the Austrian Public and Private Sectors

  • Conference paper
Electronic Government and the Information Systems Perspective (EGOVIS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 6866))

  • 1112 Accesses

Abstract

It is vital for public administrations and private businesses to send important documents such as bids or subpoenas in a secure and reliable way. Therefore, many countries have put various certified mail systems in place on the Internet. Due to the low number of official deliveries, it is reasonable to search for synergies with the private sector to guarantee the economic success of such widely-deployed systems. Opening a governmental system to the private sector inevitably raises challenges and security requirements in terms of qualified identification, data privacy protection, and trust. Privacy issues may arise when national (governmental) identification numbers are used. Trust issues may arise when trusted third parties are involved. Even if trusted third parties do not conspire with senders or recipients concerning a fair message exchange, they may cheat when financial interests come into play, e.g. in a per-message payment scheme. In this paper we present a solution addressing these issues from a practical viewpoint. Our solution distributes trust among different domains and introduces a scheme for qualified authentication and identification of recipients using the Austrian national electronic ID card to meet the requirements for data privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kremer, S., Markowitch, O., Zhou, J.: An intensive survey of fair non-repudiation protocols. Computer Communications 25(17), 1606–1621 (2002)

    Article  Google Scholar 

  2. Onieva, J., Zhou, J., Lopez, J.: Multiparty Nonrepudiation: A survey. ACM Computing Surveys 41(1) (2008)

    Article  Google Scholar 

  3. Gesamte Rechtsvorschrift für Allgemeines Verwaltungsverfahrensgesetz 1991, Fassung vom (May 23, 2011), http://www.ris.bka.gv.at/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10005768 (last visited on May 23, 2011)

  4. Gesamte Rechtsvorschrift für Zustellgesetz, Fassumg vom (May 23, 2011), http://www.ris.bka.gv.at/GeltendeFassung.wxe?Abfrage=Bundesnormen&Gesetzesnummer=10005522 (last visited on May 23, 2011)

  5. Ferrer-Gomilla, J., Onieva J., Payeras, M., Lopez, J., Certified electronic mail: Properties revisited. Computers & Security (2009)

    Google Scholar 

  6. Gennai, F., Martusciello, L., Buzzi, M.: A certified email system for the public administration in Italy. In: IADIS International Conference WWW/Internet, vol. 2, pp. 143–147 (2005)

    Google Scholar 

  7. Dietrich, J., Keller-Herder, J.: De-Mail — verschlüsselt, authentisch, nachweisbar. In: Datenschutz und Datensicherheit – DuD 2010, vol. 34(5), pp. 299–301 (2010)

    Article  Google Scholar 

  8. Tauber A.: Requirements for Electronic Delivery Systems in eGovernment – An Austrian Experience. In: IFIP I3E 2009, vol. 305, pp. 123–133 (2009)

    Chapter  Google Scholar 

  9. Oppliger, R.: Providing Certified Mail Services on the Internet. IEEE Security and Privacy 5(1), 16–22

    Article  Google Scholar 

  10. European Parliament and Council, Directive 1999/93/EC on a Community framework for electronic signatures

    Google Scholar 

  11. Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: Proceedings of 18th Annual Computer Security Applications Conference (2002)

    Google Scholar 

  12. Miranda J.P., Melo J.: EPM: Tech, Biz and Postal Services Meeting Point. In: ISSE 2004 - Securing Electronic Business Processes, pp. 259–267 (2004)

    Chapter  Google Scholar 

  13. Franklin, M., Reiter, M.: Fair exchange with a semi-trusted Third Party. In: Proceedings of 4th ACM Conference on Computer and Communications Security, pp. 1–6 (1997)

    Google Scholar 

  14. Kothari, S.C.: Generalized linear threshold scheme. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 231–241. Springer, Heidelberg (1985)

    Chapter  Google Scholar 

  15. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613

    Article  MathSciNet  Google Scholar 

  16. Micali, S.: Simultaneous electronic transactions, US Patent 5666420 (1997)

    Google Scholar 

  17. Bao, F., Wang, G., Zhou, J., Zhu, H.: Analysis and Improvement of Micali’s Fair Contract Signing Protocol. In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 176–187. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  18. Ateniese, G., Medeiros, B., Goodrich, M.: TRICERT: A Distributed Certified E-Mail Scheme. In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2001, San Diego, California, USA (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tauber, A., Zwattendorfer, B., Zefferer, T. (2011). A Shared Certified Mail System for the Austrian Public and Private Sectors. In: Andersen, K.N., Francesconi, E., Grönlund, Å., van Engers, T.M. (eds) Electronic Government and the Information Systems Perspective. EGOVIS 2011. Lecture Notes in Computer Science, vol 6866. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22961-9_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22961-9_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22960-2

  • Online ISBN: 978-3-642-22961-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics