Extending a Key-Chain Based Certified Email Protocol with Transparent TTP

Cederquist et al. proposed an optimistic certified email protocol, which employs key chains to reduce the storage requirement of the trusted third party (TTP). We extend their protocol to satisfy the property of TTP transparency, using existing verifiably encrypted signature schemes. An implementation with the scheme based on bilinear pairing makes our extension one of the most efficient certified email protocols satisfying strong fairness, timeliness, and TTP transparency.

[1]  Dan Boneh,et al.  TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .

[2]  Silvio Micali,et al.  Simple and fast optimistic protocols for fair electronic exchange , 2003, PODC '03.

[3]  Carsten Rudolph,et al.  On the security of fair non-repudiation protocols , 2003, International Journal of Information Security.

[4]  David J. Goodman,et al.  Personal Communications , 1994, Mobile Communications.

[5]  Olivier Markowitch,et al.  An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party , 2001, ISC.

[6]  Cristina Nita-Rotaru,et al.  Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption , 2002, CT-RSA.

[7]  Giuseppe Ateniese,et al.  Efficient verifiable encryption (and fair exchange) of digital signatures , 1999, CCS '99.

[8]  Johann Großschädl,et al.  On Software Parallel Implementation of Cryptographic Pairings , 2008, IACR Cryptol. ePrint Arch..

[9]  Carsten Rudolph,et al.  Security Analysis of (Un-) Fair Non-repudiation Protocols , 2002, FASec.

[10]  Robert H. Deng,et al.  Efficient and practical fair exchange protocols with off-line TTP , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).

[11]  N. Asokan,et al.  Optimistic protocols for fair exchange , 1997, CCS '97.

[12]  Thomas A. Henzinger,et al.  MOCHA: Modularity in Model Checking , 1998, CAV.

[13]  Kefei Chen,et al.  Analysis and improvement of fair certified e-mail delivery protocol , 2006, Comput. Stand. Interfaces.

[14]  Feng Bao Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes , 2004, ASIACRYPT.

[15]  Ning Zhang,et al.  Fair certified e-mail delivery , 2004, SAC '04.

[16]  Reihaneh Safavi-Naini,et al.  Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings , 2003, INDOCRYPT.

[17]  Ren-Junn Hwang,et al.  Efficient and secure protocol in fair certified E-mail delivery , 2008 .

[18]  Hovav Shacham,et al.  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.

[19]  Guilin Wang Generic non-repudiation protocols supporting transparent off-line TTP , 2006, J. Comput. Secur..

[20]  Kouichi Sakurai,et al.  A Certified E-mail System with Receiver's Selective Usage of Delivery Authority , 2002, INDOCRYPT.

[21]  Jean-Jacques Quisquater,et al.  Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA , 2004, ISC.

[22]  Colin Boyd,et al.  Off-Line Fair Payment Protocols Using Convertible Signatures , 1998, ASIACRYPT.

[23]  Ivan Damgård,et al.  Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes , 2000, ASIACRYPT.

[24]  Javier López,et al.  Multiparty nonrepudiation: A survey , 2009, CSUR.

[25]  N. Asokan,et al.  Optimistic fair exchange of digital signatures , 1998, IEEE Journal on Selected Areas in Communications.

[26]  Muhammad Torabi Dashti,et al.  A Certified Email Protocol Using Key Chains , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[27]  Xiaohui Liang,et al.  Efficient and secure protocol in fair document exchange , 2008, Comput. Stand. Interfaces.