ABSTRACT
Exchange of private information content among a large number of users via E-mail List Services is becoming increasingly common. In this paper we address security requirements in that setting and develop a new protocol, SELS (a Secure E-mail List Service) that provides confidentiality, integrity, and authentication for e-mails exchanged via lists. In addition, SELS also protects against the use of lists for e-mail spamming. We have developed a prototype of SELS in Java, and integrated it with the Eudora e-mail client.
- M. Abadi, N. Glew, B. Horne, B. Pinkas, "Certified Email with a Light On-line Trusted Third Party:Design and Implementation", in proceedings of the 11th International World Wide Web Conference, May 2002. Google ScholarDigital Library
- M. Abadi, A. Birrell, M. Burrows, F. Dabek, and T. Wobber, "Bankable Postage for Network Services", in Proceedings of the 8th Asian Computing Science Conference, Mumbai, India, December 2003.Google ScholarCross Ref
- J. Allen, The CERT Guide to System and Network Security Practices, Carnegie Mellon Software Engineering Institute, Addison Wesley, Indianapolis, 2001. ISBN 0-2-1-73723-X.Google Scholar
- I. Androutsopoulos et al., "An Experimental Comparison of Naive Bayesian and Keyword-Based Anti-Spam Filtering with Personal E-mail Messages", in Proceedings of the 23rd Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Greece, July 2000. Google ScholarDigital Library
- R. Anderson and R. Needham, "Robustness principles for public key protocols", in Advances in Cryptology (CRYPTO 95), 1995. Google ScholarDigital Library
- M. Bellare, R. Canetti, and H. Krawczyk, "Message authentication using hash functions: The HMAC construction", RSA Laboratories' CryptoBytes, Vol. 2, No. 1, Spring 1996.Google Scholar
- M. Blaze, G. Bleumer, and M. Strauss, "Divertible protocols and atomic proxy cryptography", in Eurocrypt'98, LNCS 1403, Springer-Verlag, 1998.Google Scholar
- C. Blundo, S. Cimato, and R. D. Prisco, "Certified Email: Design and Implementation of a New Optimistic Protocol", in proceedings of the Eighth IEEE International Symposium on Computers and Communications, June 30 - July 03, Turkey, 2003. Google ScholarDigital Library
- D. Boneh, X. Ding, G. Tsudik and B. Wong, "Fast Revocation of Security Capabilities", in Proceedings of the Usenix Security Symposium, August 2001. Google ScholarDigital Library
- D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing", SIAM Journal of Computing, Vol. 32, No. 3, pp. 586--615, 2003. Google ScholarDigital Library
- Catalist, the official catalog of LISTSERV lists, http://www.Isoft.com/catalist.html.Google Scholar
- R. Clayton and M. Bond, "Experience Using a Low-Cost FPGA Design to Crack DES Keys", in Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2002. Google ScholarDigital Library
- L. Cranor and B. LaMacchia, "Spam!", Communications of the ACM 41, 8 (August 1998), 74--83. Google ScholarDigital Library
- X. Ding and G. Tsudik, "Simple Identity-Based Cryptography with Mediated RSA", in Proceedings of the RSA Conference, Cryptographer's Track, 2003. Google ScholarDigital Library
- C. Dwork, M. Naor, "Pricing via Processing or Combatting Junk Mail", in Proceedings of CRYPTO'92, 1993, pp. 137--147. Google ScholarDigital Library
- C. Dwork, A. Goldberg, and M. Naor, "On Memory-Bound Functions for Fighting Spam", in advances of Cryptology (CRYPTO 2003,) August 2003.Google Scholar
- E. Gabber et al., "Curbing junk e-mail via secure classification", in Proceedings of Financial Cryptography, 1998. Google ScholarDigital Library
- T. E. Gamal, "A Public Key Cryptosystem and a Signature Scheme Based on the Discrete Logarithm", IEEE Transactions of Information Theory, pages 31(4): 469--472, 1985.Google ScholarDigital Library
- The GNU Privacy Guard, http://gnupg.org.Google Scholar
- J. loannidis, "Fighting spam by encapsulating policy in email addresses", in Proceedings of the Symposium on Network and Distributed Systems Security, 2003.Google Scholar
- A. Ivan and Y. Dodis, "Proxy Cryptography Revisited", in Proceedings of the Network and Distributed System Security Symposium (NDSS), February 2003.Google Scholar
- Y. Kim, A. Perrig and G. Tsudik, "Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups", in Proceedings of 7th ACM Conference on Computer and Communication Security (CCS), 2000. Google ScholarDigital Library
- J. Linn, "Privacy Enhancement for Internet Electronic Mail: Part I: Message Encryption and Authentication Procedures", IETF PEM WG RFC 21, 1993.Google Scholar
- LISTSERV, http://www.Isoft.com.Google Scholar
- T. Loder, M. V. Alstyne, and R. Wash, "An Economic Answer to Unsolicited Communication", in proceedings of the 5th ACM conference on Electronic Commerce, May 2004. Google ScholarDigital Library
- Mailman, the GNU mailing list manager. http://www.list.org.Google Scholar
- Majordomo, http://www.greatcircle.com/majordomo.Google Scholar
- M. Mambo and E. Okamoto, "Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts", IEICE Transactions on Fundamentals, vol. E80-A, No. 1, 1997.Google Scholar
- S. Mittra, "lolus: A Framework for Scalable Secure Multicasting", in proceedings of ACM SIGCOMM 1997. Google ScholarDigital Library
- Ostermiller Java Utilities, http://ostermiller.org/utils.Google Scholar
- T. Tompkins and D. Handley, "Giving e-mail back to the users: Using digital signatures to solve the spam problem", First Monday, 8(9), September 2003.Google Scholar
- US Department of Energy Computer Incident Advisory, January 26 2000. http://ciac.llnl.gov/ciac/bulletins/k-020.shtml.Google Scholar
- C. K. Wong, M. G. Gouda, S. S. Lam, "Secure group communications using key graphs", IEEE/ACM Transactions on Networking 8(1): 16--30, 2000. Google ScholarDigital Library
- P. Zimmerman, The Official PGP User's Guide, MIT Press, ISBN: 0-262-74017-6, May 1995. Google ScholarDigital Library
Index Terms
SELS: a secure e-mail list service
Recommendations
Invalidation of Mailing List Address to Block Spam Mails
APSCC '08: Proceedings of the 2008 IEEE Asia-Pacific Services Computing ConferenceMailing lists are used for information exchange in specific groups. However, in the recent times, the number of spam mails received has increased, and considerable amount of time is wasted in filtering spam mails. Spam filtering techniques are widerly ...
RMX: The Architecture Of Rule-based Mailing System
IDEAS '15: Proceedings of the 19th International Database Engineering & Applications SymposiumMailing lists are widespread tools to communicate and share information with each other. Especially, organizations maintain so many of them for collaborative works. Because of conventional mailing schemes, it requires constant administration from its ...
To Reply or To Reply All: Understanding Replying Behavior in Group Email Communication
CSCW '16: Proceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing“Reply” and “Reply All” buttons in email provide the convenience of a quick reply to those included in the email. Yet this very convenience can be troublesome to both the individual and the group involved if receivers intentionally or unintentionally ...
Comments