A randomized protocol for signing contracts
Communications of the ACM
How to simultaneously exchange secrets by general assumptions
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Efficient verifiable encryption (and fair exchange) of digital signatures
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Certified email with a light on-line trusted third party: design and implementation
Proceedings of the 11th international conference on World Wide Web
A Fair-exchange E-commerce Protocol with Automated Dispute Resolution
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Optimistic Fair Exchange with Transparent Signature Recovery
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Some Remarks on a Fair Exchange Protocol
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Optimistic fair exchange of digital signatures
IEEE Journal on Selected Areas in Communications
Accountability protocols: Formalized and verified
ACM Transactions on Information and System Security (TISSEC)
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Providing Certified Mail Services on the Internet
IEEE Security and Privacy
Efficient and secure protocol in fair document exchange
Computer Standards & Interfaces
Efficient and secure protocol in fair certified E-mail delivery
WSEAS Transactions on Information Science and Applications
Analysis and improvement of fair certified e-mail delivery protocol
Computer Standards & Interfaces
An agent-mediated fair exchange protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Verification of A Key Chain Based TTP Transparent CEM Protocol
Electronic Notes in Theoretical Computer Science (ENTCS)
Efficient fair certified e-mail delivery based on RSA
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Efficient identity-based protocol for fair certified e-mail delivery
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
Communication by e-mail has become a vital part of everyday business and has replaced most of the conventional ways of communicating. Important business correspondence may require certified e-mail delivery, analogous to that provided by conventional mail service. This paper presents a novel certified e-mail delivery protocol that provides non-repudiation of origin and non-repudiation of receipt security services to protect communicating parties from each other's false denials that the e-mail has been sent and received. The protocol provides strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. The protocol makes use of an off-line and transparent trusted third party only in exceptional circumstances, i.e. when the communicating parties fail to complete the e-mail for receipt exchange due to a network failure or a party's misbehaviour. Considerations have been taken in the protocol design to reduce the use of expensive cryptographic operations for better efficiency and cost-effectiveness.