Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy (including encrypted e-mail) and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls.
[1]
Amir Herzberg,et al.
Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites
,
2004
.
[2]
Moni Naor,et al.
On Memory-Bound Functions for Fighting Spam
,
2003,
CRYPTO.
[3]
Philip R. Zimmermann,et al.
The official PGP user's guide
,
1996
.
[4]
Hugo Krawczyk,et al.
A Security Architecture for the Internet Protocol
,
1999,
IBM Syst. J..
[5]
Moni Naor,et al.
Pricing via Processing or Combatting Junk Mail
,
1992,
CRYPTO.
[6]
Robert J. Hall,et al.
Channels: Avoiding unwanted electronic mail
,
1996,
Network Threats.
[7]
Markus Jakobsson,et al.
Curbing Junk E-Mail via Secure Classification
,
1998,
Financial Cryptography.
[8]
Ross J. Anderson,et al.
Robustness Principles for Public Key Protocols
,
1995,
CRYPTO.