Abstract
We describe a new network service, the ”ticket server”. This service provides ”tickets” that a client can attach to a request for a network service (such as sending email or asking for a stock quote). The recipient of such a request (such as the email recipient or the stockbroker) can use the ticker server to verify that the ticket is valid and that the ticket hasn’t been used before. Clients can acquire tickets ahead of time, independently of the particular network service request. Clients can maintain their stock of tickets either on their own storage, or as a balance recorded by the ticket server. Recipients of a request can tell the ticket server to refund the attached ticket to the original client, thus incrementing the client’s balance at the ticket server. For example, an email recipient might do this if the email wasn’t spam. This paper describes the functions of the ticket server, defines a cryptographic protocol for the ticket server’s operations, and outlines an efficient implementation for the ticket server.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified Email with a Light On-Line Trusted Third Party: Design and Implementation. In: Proceedings of the Eleventh International World Wide Web Conference, May 2002, pp. 387–395 (2002)
Abadi, M., Burrows, M., Manasse, M., Wobber, E.: Moderately Hard, Memory-bound Functions. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, February 2003, pp. 25–39 (2003)
Von Ahn, L., Blum, M., Hopper, N., Langford, A.: Captcha, At http://www.captcha.net
Androutsopoloulos, A., et al.: An experimental comparison of naïve Bayesian and keyword- based anti-spam filtering with personal e-mail messages. In: Proceedings of SIGIR-2000, 23rd ACM International Conference on Research and Development in Information Retrieval, pp. 160–167. ACM Press, New York (2000)
AOL press release on Business Wire, as reported by the Washington Post (February 2003), http://sites.stockpoint.com/wpost/newspaperbw.asp?dispnav=&Story=20030220/051b1753.xml
Back, A.: HashCash (1997), http://www.cyberspace.org/~adam/hashcash
Bahreman, A., Tygar, J.D.: Certified electronic mail. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 1994, pp. 3–19 (1994)
Camram, At http://www.camram.org
Cranor, L., LaMacchia, B.: Spam! Commun. ACM 41(8), 74–83 (1998)
Dwork, C., Goldberg, A., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)
Dwork, C., Naor, M.: Pricing via processing or combating junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
Fahlman, S.: Selling interrupt rights: a way to control unwanted e-mail and telephone calls. IBM Systems Journal 41(4), 759–766 (2002)
Gabber, E., et al.: Curbing junk e-mail via secure classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)
Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceedings of the Fourth International World Wide Web Conference, pp. 603–618. O’Reilly and Associates, Sebastopol (1995)
Ioannidis, J.: Fighting spam by encapsulating policy in email addresses. In: Proceedings Symposium on Network and Distributed Systems Security 2003, February 2003, pp. 17–24 (2003)
Kohl, J., Neuman, C.: The Kerberos network authentication service, At http://www.rfc-editor.org/rfc/rfc1510.txt
Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)
McCurley, K.: Deterrence measures for spam. slides presented at the RSA conference (January 1998), http://www.almaden.ibm.com/cs/k53/pmail/
Mullender, S., Tannenbaum, A.: The design of a capability-based operating system. Computer Journal 29(4), 289–299 (1986)
Templeton, B.: E-stamps, http://www.templetons.com/brad/spume/estamps.html (undated)
Tygar, J.D., Yee, B., Heintze, N.: Cryptographic Postage Indicia. In: Jaffar, J., Yap, R.H.C. (eds.) ASIAN 1996. LNCS, vol. 1179, pp. 378–391. Springer, Heidelberg (1996)
Zhou, J., Gollmann, D.: Certified electronic mail. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 160–171. Springer, Heidelberg (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T. (2003). Bankable Postage for Network Services. In: Saraswat, V.A. (eds) Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation. ASIAN 2003. Lecture Notes in Computer Science, vol 2896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40965-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-540-40965-6_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-20632-3
Online ISBN: 978-3-540-40965-6
eBook Packages: Springer Book Archive