Skip to main content

Curbing junk e-mail via secure classification

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1465))

Abstract

We introduce a new method and system to curb junk e-mail by employing extended e-mail addresses. It enables a party to use her (core) e-mail address with different extensions and consequently classify incoming e-mail messages according to the extension they were sent to. Our contributions are threefold: First, we identify the components of a system that realizes the concept of extended e-mail addresses and investigate the functionality of these components in a manner which is backwards compatible to current e-mail tools. Secondly, we specify an adversarial model, and give the necessary properties of extended e-mail addresses and of the procedure to obtain them in the presence of the adversary. Finally, we design cryptographic functions that enable realizing extended e-mail addresses which satisfy these properties.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Bleichenbacher, E. Gabber, P. Gibbons, Y. Matias, A. Mayer, On Secure and Pseudonymous Client-Relationships with Multiple Servers, submitted, also available at url http://www.bell-labs.com/projects/lpwa/papers.html.

    Google Scholar 

  2. N.S. Borenstein and C.A. Thyberg, Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System, International Journal of Man-Machine Studies, Volume 34, Number 2, February 1991, pp. 229–259.

    Article  Google Scholar 

  3. L.F. Cranor and B.A. LaMacchia, Spam!, to appear in Communications of the ACM. Also available at url http://www.research.att.com/~lorrie/pubs/spam/.

    Google Scholar 

  4. C. Dwork and M. Naor, Pricing via Processing or Combating Junk Mail, Crypto'92, pp. 139–147.

    Google Scholar 

  5. M. Franklin and D. Malkhi, Auditable Metering with Lightweight Security, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 151–160.

    Google Scholar 

  6. E. Gabber, P. Gibbons, Y. Matias, A. Mayer, How to Make Personalized Web Browsing Simple, Secure, and Anonymous, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 17–31. Also available at url http://www.bell-labs.com/projects/lpwa/papers.html.

    Google Scholar 

  7. R.J. Hall, Channels: Avoiding Unwanted Electronic Mail, to appear in Communications of the ACM. Also available at url ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps.

    Google Scholar 

  8. LPWA: The Lucent Personalized Web Assistant, A Bell Labs Technology Demonstration. Available at url http://lpwa.com.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Rafael Hirchfeld

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gabber, E., Jakobsson, M., Matias, Y., Mayer, A. (1998). Curbing junk e-mail via secure classification. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055484

Download citation

  • DOI: https://doi.org/10.1007/BFb0055484

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64951-9

  • Online ISBN: 978-3-540-53918-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics