E-mail security: how to keep your electronic messages private
E-mail security: how to keep your electronic messages private
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Efficient verifier-based password-authenticated key exchange in the three-party setting
Computer Standards & Interfaces
Cryptanalysis of e-mail protocols providing perfect forward secrecy
Computer Standards & Interfaces
A Novel E-Mail Protocol Using Three-Party Password-Authenticated Key Exchange
SECTECH '08 Proceedings of the 2008 International Conference on Security Technology
New directions in cryptography
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Electronic mail (e-mail) systems are widely used in the Internet. A user usually needs to send an e-mail to a group of users. In this paper, a secure multicast key protocol for e-mail systems with providing perfect forward secrecy is proposed to ensure confidentiality and authentication of this kind of e-mail system. The protocol employs the Chinese Remainder Theorem, RSA public key cryptosystems, and one-way hash functions. The protocol can save redundant key materials used for the e-mails. Via the security analysis, the protocol can satisfy the security requirements. In addition, we analyze the computation complexity of the protocol. The result showed that the protocol can save the computation cost for each e-mail sender. Copyright © 2012 John Wiley & Sons, Ltd.