Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Selective Receipt in Certified E-mail
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
An Efficient Protocol for Certified Electronic Mail
ISW '00 Proceedings of the Third International Workshop on Information Security
An Attack on a Protocol for Certified Delivery
ISC '02 Proceedings of the 5th International Conference on Information Security
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Certified mail: the next challenge for secure messaging
Communications of the ACM - Interactive immersion in 3D graphics
An intensive survey of fair non-repudiation protocols
Computer Communications
Multiparty nonrepudiation: A survey
ACM Computing Surveys (CSUR)
Some common attacks against certified email protocols and the countermeasures
Computer Communications
Hi-index | 0.00 |
Certified e-mail is a value-added service for standard e-mail systems, in which the intended recipient gets the mail content if and only if the mail originator receives a non-repudiation evidence that the message has been received by the recipient. As far as security is concerned, fairness is one of the most important requirements. Recently, Galdi and Giordano (2004) presented an optimistic protocol for certified e-mail with temporal authentication. In this paper, we analyze their protocol and demonstrate that it cannot achieve true fairness and has some other weaknesses. We further propose the improvements to avoid those security problems.