Revocation of unread E-mail in an untrusted network

Authors: A. Rubin, D. Boneh, and K. Fu

We present protocols for enhancing e-mail systems to allow for secure revocation of messages. This paper identifies the security requirements for e-mail revocation and then shows how our protocols adhere to these requirements. Three different levels of security and threat models are described. We discuss our implementation of the level 1 protocol, which assumes no security infrastructure. The protocols were designed so that existing mailers can easily be enhanced with these new features.

In Proceedings 1997 Australian Conference on Information Security, ACISP 1997, LNCS 1270, pp. 62-75

Full paper: HTML