Revocation of unread E-mail in an untrusted network
Authors: A. Rubin, D. Boneh, and K. Fu
Abstract:
We present protocols for enhancing e-mail systems
to allow for secure revocation of messages. This
paper identifies the security requirements for
e-mail revocation and then shows how our protocols
adhere to these requirements. Three different
levels of security and threat models are described.
We discuss our implementation of the
level 1 protocol, which assumes no security infrastructure.
The protocols were designed so that existing mailers
can easily be enhanced with these new features.
Reference:
In Proceedings 1997 Australian Conference on Information Security,
ACISP 1997, LNCS 1270, pp. 62-75
Full paper: HTML