Privacy Enhancement for Internet Electronic Mail: Part IV: Key Certification and Related Services (original) (raw)
Related papers
Practical protocols for certified electronic mail
Journal of Network and Systems Management, 1996
Electronic mail, or e-mail, has brought us a big step closer towards the vision of paperless offices. To advance even closer to this vision, however, it is essential that existing e-mail systems be enhanced with value-added services which are capable of replacing many of the human procedures established in pen and paper communications. One of the most important and desirable such services is certified e-mail delivery, in which the intended recipient will get the mail content if and only if the mail originator receives an irrefutable proof-of-delivery from the recipient. In this paper, we present the design of two third-party based certified mail protocols, termed CMPI and CMP2. Both protocols are designed for integration into existing standard e-mail systems and both satisfy the requirements of nonrepudiation of origin, nonrepudiation of delivery, and fairness. The difference between CMPI and CMP2 is that the fornler provides no mail content confidentiality protection while the latter provides such a protection. Moreover, security of the protocols are analyzed using a recently proposed accountability framework.
Cert’eM: Certification System Based on Electronic Mail Service Structure
Lecture Notes in Computer Science, 1999
Public-Key Infrastructures are considered the basis of the protocols and tools needed to guarantee the security demanded for new Internet applications like electronic commerce, government-citizen relationships and digital distribution. This paper introduces a new infrastructure design, Cert'eM, a key management and certification system that is based on the structure of the electronic mail service and on the principle of near-certification. Cert'eM provides secure means to identify users and distribute their public-key certificates, enhances the efficiency of revocation procedures, and avoids scalability and synchronization problems. The system, developed and tested at the University of Malaga, was recently selected by RedIRIS, the National Research and Academic Network in Spain, to provide the public key service for its secure electronic mail.
When a Certification Authority (CA) issues X.509 public-key certificate to bind a public key to a user, the user is specified through one or more subject names in the "subject" field and the "subjectAltName" extension field of a certificate. The "subject" field or the "subjectAltName" extension field may contain a hierarchically structured distinguished name, an electronic mail address, IP address, or other name forms that correspond to the subject. In this paper, we propose the methods to protect the user's privacy information contained in the "subject" field or the "subjectAltName" extension field of a public-key certificate.
IJERT-Fair and Secure Certified Email Protocol
International Journal of Engineering Research and Technology (IJERT), 2013
https://www.ijert.org/fair-and-secure-certified-email-protocol https://www.ijert.org/research/fair-and-secure-certified-email-protocol-IJERTV2IS80689.pdf To provide fairness and confidentiality is more and important in communication system as more and more security related problems have been encountered in today world. In response to this, solutions to these problems have been proposed and some of these guarantee the desired cryptographic strength to some extent. Some of which consider only guaranteeing the fairness between the participants, integrity, non-repudiation properties and the confidentiality of the mail content is not taken into account. The proposed system is aimed to provide a fair and secure certified email protocol which guarantees the fairness, confidentiality, integrity and non-repudiation properties so that the participants can send and receive their mail in secret form and no one else can see the mail content but only intended user can. In this proposed system, the off-line trusted third party (optimistic) will be participated in case of dispute occurs.
Most of the existing mailing systems provide limited authentication mechanisms, including web trust model, password authentication or identity based cryptography. Few existing mailing systems found in the literature provide strong authentication based on public key infrastructure (PKI). However, PKI based-systems generally suffer from certificate management and scalability problems. This paper proposes a mailing system that is based on certificeteless cryptography. In the proposed mailing system the message payload is encrypted by a per-mail symmetric key generated from a secret value, the public and private keys of the sender and the receiver at each side. The proposed mailing system is secure against standard security model and provides many security properties.
Vis-a-vis Cryptography: Private and Trustworthy In-Person Certifications
2012
The growing role of mobile devices in previously face to face interactions presents new domains for cryptographic applications. At the same, time the increased role of digital systems raises new security and privacy issues. With some thirty thousand notifications sent, inSPOT. org's electronic notification of exposure to sexually transmitted infections is one such concerning development. This paper explores those concerns, the features of an ideal service for both notification and certification, and outlines protocols for cryptographic ...
A taxonomy of certificate status information mechanisms
2000
Abstract A number of mechanisms have been proposed for generating and disseminating information on the status of certificates. Their operation is different, if not contradicting sometimes, and advantages and disadvantages depend on the requirements of the underlying PKI. PKI designers and implementors should perform a small scale study before deploying such a mechanism in a specific PKI, in order to select the most suitable mechanism for their environment.
2010
ECC public key and signature support in Cryptographically Generated Addresses (CGA) and in the Secure Neighbor Discovery (SEND) draft-cheneau-csi-ecc-sig-agility-00 Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
PriviPK: Certificate-less and secure email communication
Computers & Security, 2017
Her research interests include the general area of privacy enhancing technologies with a particular interest in anonymous and secure communication, cryptocurrency, traffic analysis and side-channel attacks.