The official PGP user's guide
Digital Rights Management: Business and Technology
Digital Rights Management: Business and Technology
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Securing E-Mail with Identity-Based Encryption
IT Professional
A Secure Email Encryption Proxy Based on Identity-Based Cryptography
MMIT '08 Proceedings of the 2008 International Conference on MultiMedia and Information Technology
Hi-index | 0.00 |
Email has been one of the most common medium for online communication. Directly proportional to this situation is the significant financial loss or privacy disclosure resulting from the unprotected emails. We need a secure email system to protect email wherever it goes. However, most existing secure email solutions can only achieve security during email transmission. After an encrypted email is received and downloaded on the recipient's computer, the email will lose protection. In this paper, we propose a copy protection method for email based on "client-to-client" architecture. The foundation of our method is a password based key negotiation protocol between two clients. Moreover, device-bound technology and commutative symmetric encryption are applied in our method to achieve persistent copy protection. Our method balances flexibility and security by allowing users to receive and use email on any of their devices.