Skip to main content

Revocation of unread e-mail in an untrusted network

  • Network Security
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1270))

Included in the following conference series:

Abstract

We present protocols for enhancing e-mail systems to allow for secure revocation of messages. This paper identifies the security requirements for e-mail revocation and then shows how our protocols adhere to these requirements. Three different levels of security and threat models are described. We discuss our implementation of the level 1 protocol, which assumes no security infrastructure. The protocols were designed so that existing mailers can easily be enhanced with these new features.

The full version of this paper appears at http://www.cs.nyu.edu/~rubin/email.ps.gz

Group Wise is a trademark of Novell.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. David Chaum. Untraceable electronic mail, return adresses, and digital pseudonyms. Communications of the ACM, 24(2):84–88, February 1981.

    Article  Google Scholar 

  2. D. Eastlake, S. Crocker, and J. Schiller. Randomness recommendations for security. RFC 1750, December 1994.

    Google Scholar 

  3. Ceki Gulcu and Gene Tsudik. Mixing E-mail with BABEL. Symposium on Network and Distributed System Security, pages 2–16, February 1996.

    Google Scholar 

  4. MTS volume 23: Messaging and conferencing in MTS, February 1991.

    Google Scholar 

  5. National Bureau of Standards. Data encryption standard. Federal Information Processing Standards Publication, 1(46), 1977.

    Google Scholar 

  6. R. Rivest. The md5 message digest algorithm. RFC 1321, April 1992.

    Google Scholar 

  7. A. Shamir. How to share a secret. Communications of the ACM, 22:612–613, November 1979.

    Article  Google Scholar 

  8. Douglas Stinson. Cryptography: Theory and Practice. CRC Press, Inc, 1995.

    Google Scholar 

  9. Domestic mail manual, September 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vijay Varadharajan Josef Pieprzyk Yi Mu

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rubin, A.D., Boneh, D., Fu, K. (1997). Revocation of unread e-mail in an untrusted network. In: Varadharajan, V., Pieprzyk, J., Mu, Y. (eds) Information Security and Privacy. ACISP 1997. Lecture Notes in Computer Science, vol 1270. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0027944

Download citation

  • DOI: https://doi.org/10.1007/BFb0027944

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63232-0

  • Online ISBN: 978-3-540-69237-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics