Abstract
We introduce a new method and system to curb junk e-mail by employing extended e-mail addresses. It enables a party to use her (core) e-mail address with different extensions and consequently classify incoming e-mail messages according to the extension they were sent to. Our contributions are threefold: First, we identify the components of a system that realizes the concept of extended e-mail addresses and investigate the functionality of these components in a manner which is backwards compatible to current e-mail tools. Secondly, we specify an adversarial model, and give the necessary properties of extended e-mail addresses and of the procedure to obtain them in the presence of the adversary. Finally, we design cryptographic functions that enable realizing extended e-mail addresses which satisfy these properties.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
References
D. Bleichenbacher, E. Gabber, P. Gibbons, Y. Matias, A. Mayer, On Secure and Pseudonymous Client-Relationships with Multiple Servers, submitted, also available at url http://www.bell-labs.com/projects/lpwa/papers.html.
N.S. Borenstein and C.A. Thyberg, Power, Ease of Use and Cooperative Work in a Practical Multimedia Message System, International Journal of Man-Machine Studies, Volume 34, Number 2, February 1991, pp. 229–259.
L.F. Cranor and B.A. LaMacchia, Spam!, to appear in Communications of the ACM. Also available at url http://www.research.att.com/~lorrie/pubs/spam/.
C. Dwork and M. Naor, Pricing via Processing or Combating Junk Mail, Crypto'92, pp. 139–147.
M. Franklin and D. Malkhi, Auditable Metering with Lightweight Security, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 151–160.
E. Gabber, P. Gibbons, Y. Matias, A. Mayer, How to Make Personalized Web Browsing Simple, Secure, and Anonymous, Proc. of Financial Cryptography'97, Springer-Verlag, LNCS 1318, pp. 17–31. Also available at url http://www.bell-labs.com/projects/lpwa/papers.html.
R.J. Hall, Channels: Avoiding Unwanted Electronic Mail, to appear in Communications of the ACM. Also available at url ftp://ftp.research.att.com/dist/hall/papers/agents/channels-long.ps.
LPWA: The Lucent Personalized Web Assistant, A Bell Labs Technology Demonstration. Available at url http://lpwa.com.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gabber, E., Jakobsson, M., Matias, Y., Mayer, A. (1998). Curbing junk e-mail via secure classification. In: Hirchfeld, R. (eds) Financial Cryptography. FC 1998. Lecture Notes in Computer Science, vol 1465. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0055484
Download citation
DOI: https://doi.org/10.1007/BFb0055484
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64951-9
Online ISBN: 978-3-540-53918-6
eBook Packages: Springer Book Archive