A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
Prudent Engineering Practice for Cryptographic Protocols
IEEE Transactions on Software Engineering
Optimistic protocols for fair exchange
Proceedings of the 4th ACM conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
Handbook of Applied Cryptography
Handbook of Applied Cryptography
SIAM Journal on Computing
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Selective Receipt in Certified E-mail
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
An Attack on a Protocol for Certified Delivery
ISC '02 Proceedings of the 5th International Conference on Information Security
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
An Efficient Non-repudiation Protocol
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Simple and fast optimistic protocols for fair electronic exchange
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
On the security of a certified e-mail scheme with temporal authentication
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
On the security of a certified e-mail scheme
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
A certified mail system (CMS) for the Internet
Computer Communications
An intensive survey of fair non-repudiation protocols
Computer Communications
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Generic non-repudiation protocols supporting transparent off-line TTP
Journal of Computer Security - On IWAP'05
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Hi-index | 0.24 |
Certified email is a value-added service for standard email systems, which guarantees the fairness, i.e., the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation receipt showing that the message has been received by the recipient. As far as security is concerned, fairness is the most important requirements, though some other properties are also desirable in practice. Recently, a number of certified email protocols have been proposed. However, most of those schemes have more or less weaknesses and/or security flaws. In the worst case, fairness cannot be achieved since one dishonest party can mount some attacks to cheat the honest party such that the latter cannot get the expected items. In this paper, we analyze two latest certified email protocols to demonstrate some common attacks, and then propose some improvements to avoid those security problems. We further give several informal but useful guidelines to counter those common attacks in the design of certified email protocols.