Abstract
In 1984 Adi Shamir requested a solution for a novel public-key encryption scheme, called identity-based encryption (IBE). The original motivation for IBE was to help the deployment of a public-key infrastructure. The idea of an IBE scheme is that the public key can be any arbitrary string, for example, an email address, a name or a role. An IBE scheme does not need to download certificates to authenticate public keys as in a public-key infrastructure (PKI). A public key in an identity-based cryptosystem is simply the receiver’s identity, e.g. an email address. As often, when new technology occurs, the focus is on the functionality of the technology and not on its security. In this paper we briefly review about identity-based encryption and decryption. Later on we show that IBE schemes used for secure emailing render spamming far easier for spammers compared to if a PKI certificate approach is used.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Shamir, A.: Identity-based cryptography and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Feige, U., Fiat, A., Shamir, A.: Zero-knowledge proofs of identity. J. Cryptology 1, 77–94 (1988)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signa-ture problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boyen, X.: Multipurpose Identity-based signcryption, a Swiss army knife for identity-based cryptography. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 383–399. Springer, Heidelberg (2003)
Chen, L., Kudla, C.: Identity-based authenticated key agreement protocols from pairings, Cryptology ePrint Archive, Report 2002/184 (2002), http://eprint.iacr.org/2002/184
Lynn, B.: Authenticated identity-based encryption, Cryptology ePrint Archive, Report 2002/072 (2002), http://eprint.iacr.org/2002/072
Waters, B.R.: Efficient Identity-Based Encryption Without Random Oracles, Cryptology ePrint Archive, Report 2004/180 (2004), http://eprint.iacr.org/2004/180
Voltage security, E-mail Security – The IBE Advantage (2004)
Veigner, C., Rong, C.: Identity-Based Key Agreement and Encryption for Wireless Sensor Networks (in preprint)
Veigner, C., Rong, C.: Simulating Identity-Based Key Agreement For Wireless Sensor Networks (in preprint)
Data Encryption Standard (DES), FIPS 46-2, http://www.itl.nist.gov/fipspubs/fip46-2.htm
Advanced Encryption Standard (AES), FIPS 197, http://csrc.nist.gov/CryptoToolkit/aes/
Securence, http://www.securence.com
Frontbridge, http://www.forntbridge.com
Logic, M.X.: http://www.mxlogic.com
Norman, http://www.norman.com
Clam Antivirus, www.clamav.net www.clamwin.com
Schlegel, R., Vaudenay, S.: Enforcing Email Addresses Privacy Using Tokens. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 91–100. Springer, Heidelberg (2005)
SpamArrest, http://www.spamarrest.com
Roman, R., Zhou, J., Lopez, J.: Protection against Spam using Pre-Challenges. In: Security and Privacy in the Age of Ubiquitous Computing IFIP TC11, 20th International Information Security Conference (Sec 2005), pp. 281–294. Springer, Heidelberg (2005)
Harris, E.: The Next Step in the Spam Control War: Graylisting (2003), http://www.graylisting.org/
Delany, M.: Domain-based Email Authentication Using Public-Keys Advertised in the DNS (DomainKeys). IETF Draft (2005)
Ioannidis, J.: Fighting Spam by Encapsulating Policy in Email Addresses. In: Symposium on Network and Distributed Systems Security (NDSS 2003) (February 2003)
Cranor, L.F., LaMacchia, B.A.: SPAM! Communications of the ACM 41(8), 74–83 (1998)
Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T.: Bankable Postage for Network Services. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol. 2896, pp. 72–90. Springer, Heidelberg (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Veigner, C., Rong, C. (2006). On Email Spamming Under the Shadow of Large Scale Use of Identity-Based Encryption. In: Yang, L.T., Jin, H., Ma, J., Ungerer, T. (eds) Autonomic and Trusted Computing. ATC 2006. Lecture Notes in Computer Science, vol 4158. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11839569_51
Download citation
DOI: https://doi.org/10.1007/11839569_51
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-38619-3
Online ISBN: 978-3-540-38622-3
eBook Packages: Computer ScienceComputer Science (R0)