Non-repudiation with mandatory proof of receipt
ACM SIGCOMM Computer Communication Review
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Selective Receipt in Certified E-mail
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
Fair certified e-mail delivery
Proceedings of the 2004 ACM symposium on Applied computing
Verifiable encryption of digital signatures and applications
ACM Transactions on Information and System Security (TISSEC)
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
Short Signatures from the Weil Pairing
Journal of Cryptology
Certified E-Mail Delivery with DSA Receipts
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security
Practical and efficient fair document exchange over networks
Journal of Network and Computer Applications
An anonymous and failure resilient fair-exchange e-commerce protocol
Decision Support Systems
Cryptography: An Introduction
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Certificate-based verifiably encrypted signatures from pairings
Information Sciences: an International Journal
Security analysis of batch verification on identity-based signature schemes
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
MIV'06 Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies
Some common attacks against certified email protocols and the countermeasures
Computer Communications
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
Standards and verification for fair-exchange and atomicity in e-commerce transactions
Information Sciences: an International Journal
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Improved multi-party contract signing
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Achieving fairness in private contract negotiation
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
An ID-Based verifiable encrypted signature scheme based on hess’s scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Verification of A Key Chain Based TTP Transparent CEM Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
An efficient and secure protocol in certified e-mail delivery is proposed in this paper. With the widespread use of public Internet, communication via electronic mail (e-mail) becomes a convenience application instead of traditional manuscript letter. People can easily append his/her digital signature to the email in order to achieve the goal of non-repudiation of origin. However, the evidence of receipt still relies on the willingness of the recipient in the standard e-mail service. Hence, the recipient has no responsible for the received e-mail. In this paper, we present an efficient and secure protocol in fair certified e-mail delivery (CEMD). Our protocol efficiently provides non-repudiation of origin and receipt in the fair manner. In other words, the sender can obtain the irrefutable receipt if and only if the recipient gets the certified e-mail from the sender, otherwise, neither of them. Moreover, the proposed CEMD is efficiently in sending the other mails to the same recipient by using the pre-computation function. As the evaluations of computational cost and communication overhead, our protocol is cost-effective and efficient than other relevant protocols.