RSA-based Verifiable and Recoverable Encryption of Signatures and its application in certified e-mail delivery

被引:2
|
作者
Nenadic, Aleksandra [1 ]
Zhang, Ning [1 ]
Shi, Qi [2 ]
机构
[1] Univ Manchester, Sch Comp Sci, Manchester, Lancs, England
[2] Liverpool John Moores Univ, Sch Comp & Math Sci, Liverpool, Merseyside, England
关键词
D O I
10.3233/JCS-2005-13504
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents two variant protocols RSA-CEMD1 and RDA-CEMD2 for certified e-mail delivery with RSA receipts. The protocols provide non-repudiation of origin and non-repudiation of receipt security services to protect communicating parties from each other's false denials that the e-mail message has been sent and received. The protocols also provide strong fairness to ensure that the recipient receives the e-mail if and only if the sender receives the receipt. Services of an off-line and transparent third party are invoked in the protocols only in exceptional circumstances, i.e., when the communicating parties fail to complete the e-mail for receipt exchange due to a network failure or a party's misbehaviour. Protocol RSA-CEMD1 also offers confidentiality protection for the e-mail message and the corresponding receipt from the third party, achieved at the cost of some additional computations. The protocols are based on a cryptographic primitive called Verifiable and Recoverable Encryption of a Signature (VRES). The novel design of the VRES allows efficiency improvements in comparison with the related certified e-mail delivery protocols based on similar primitives.
引用
收藏
页码:757 / 777
页数:21
相关论文
共 44 条
  • [1] RSA-based certified delivery of e-goods using verifiable and recoverable signature encryption
    Nenadic, A
    Zhang, N
    Cheetham, B
    Goble, C
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2005, 11 (01) : 175 - 192
  • [2] DSA-based verifiable and recoverable encryption of signatures and its application in certified e-goods delivery
    Nenadic, A
    Zhang, N
    Shi, Q
    Goble, C
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 94 - 99
  • [3] Efficient fair certified e-mail delivery based on RSA
    Zhang, ZF
    Feng, DG
    [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 368 - 377
  • [4] Certified e-mail protocol with verifiable third party
    Puigserver, MM
    Gomila, JLF
    Rotger, LHI
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 548 - 551
  • [5] Efficient Deniably Authenticated Encryption and Its Application to E-Mail
    Li, Fagen
    Zhong, Di
    Takagi, Tsuyoshi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) : 2477 - 2486
  • [6] Timed-release encryption with pre-open capability and its application to certified e-mail system
    Hwang, YH
    Yum, DH
    Lee, PJ
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2005, 3650 : 344 - 358
  • [7] Identity-based deniable authenticated encryption and its application to e-mail system
    Li, Fagen
    Zheng, Zhaohui
    Jin, Chunhua
    [J]. TELECOMMUNICATION SYSTEMS, 2016, 62 (04) : 625 - 639
  • [8] Identity-based deniable authenticated encryption and its application to e-mail system
    Fagen Li
    Zhaohui Zheng
    Chunhua Jin
    [J]. Telecommunication Systems, 2016, 62 : 625 - 639
  • [9] Efficient identity-based protocol for fair certified e-mail delivery
    Zhang, ZF
    Xu, J
    Feng, DG
    [J]. CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2005, 3810 : 200 - 210
  • [10] Analysis and improvement of fair certified e-mail delivery protocol
    Ma, CS
    Li, SQ
    Chen, KF
    Liu, SL
    [J]. COMPUTER STANDARDS & INTERFACES, 2006, 28 (04) : 467 - 474