Publications

Revocation of unread E-mail in an untrusted network

Authors: A. Rubin, D. Boneh, and K. Fu

Abstract:
We present protocols for enhancing e-mail systems to allow for secure revocation of messages. This paper identifies the security requirements for e-mail revocation and then shows how our protocols adhere to these requirements. Three different levels of security and threat models are described. We discuss our implementation of the level 1 protocol, which assumes no security infrastructure. The protocols were designed so that existing mailers can easily be enhanced with these new features.

Reference:
In Proceedings 1997 Australian Conference on Information Security, ACISP 1997, LNCS 1270, pp. 62-75

Full paper: HTML