Abstract In certified email (CEM) protocols, TTP trans-parency is an important security requirement which helps to avoid bad publicity as well as protecting individual users ’ pri-vacy. Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage re-quirement of the trusted third party (TTP). We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An imple-mentation with the scheme based on bilinear pairing makes our extension one of the most efficient CEM protocols satis-fying strong fairness, timeliness, and TTP transparency. We formally verify the security requirements of the extended pro-tocol. The properties of fair...
[[abstract]]An efficient and secure protocol in certified e-mail delivery is proposed in this paper....
As a value-added service for standard e-mail systems, a certified e-mail scheme allows a sender to d...
Abstract. Nowadays, e-mail has become one of the most widely used communication medium. Because of i...
peer reviewedIn certified email (CEM) protocols, trusted third party (TTP) transparency is an import...
AbstractIn certified email (CEM) protocols, TTP transparency is an important security requirement wh...
In certified email (CEM) protocols, TTP transparency is an important security requirement which help...
Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduc...
Abstract—Cederquist et al. proposed an optimistic certified email protocol, which employs key chains...
Certified email protocols to facilitate secureelectronic mail delivery are necessary if the Internet...
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make us...
Abstract This paper introduces an asynchronous optimistic certied email protocol, with stateless re...
Certified mail is a special postal service that provides the sender with a proof that the mail was s...
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients...
Abstract:- An efficient and secure protocol in certified e-mail delivery is proposed in this paper. ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
[[abstract]]An efficient and secure protocol in certified e-mail delivery is proposed in this paper....
As a value-added service for standard e-mail systems, a certified e-mail scheme allows a sender to d...
Abstract. Nowadays, e-mail has become one of the most widely used communication medium. Because of i...
peer reviewedIn certified email (CEM) protocols, trusted third party (TTP) transparency is an import...
AbstractIn certified email (CEM) protocols, TTP transparency is an important security requirement wh...
In certified email (CEM) protocols, TTP transparency is an important security requirement which help...
Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduc...
Abstract—Cederquist et al. proposed an optimistic certified email protocol, which employs key chains...
Certified email protocols to facilitate secureelectronic mail delivery are necessary if the Internet...
This paper presents a new simple schemes for verifiable encryption of digital signatures. We make us...
Abstract This paper introduces an asynchronous optimistic certied email protocol, with stateless re...
Certified mail is a special postal service that provides the sender with a proof that the mail was s...
This paper introduces an asynchronous optimistic certified email protocol, with stateless recipients...
Abstract:- An efficient and secure protocol in certified e-mail delivery is proposed in this paper. ...
Current Transport Layer Security (TLS) Public-Key Infrastructure (PKI) is a vast and complex system;...
[[abstract]]An efficient and secure protocol in certified e-mail delivery is proposed in this paper....
As a value-added service for standard e-mail systems, a certified e-mail scheme allows a sender to d...
Abstract. Nowadays, e-mail has become one of the most widely used communication medium. Because of i...