Proceedings of the 8th Symposium on Identity and Trust on the Internet 2009
DOI: 10.1145/1527017.1527032
|View full text |Cite
|
Sign up to set email alerts
|

Usable secure mailing lists with untrusted servers

Abstract: Mailing lists are a natural technology for supporting messaging in multi-party, cross-domain collaborative tasks. However, whenever sensitive information is exchanged on such lists, security becomes crucial. We have earlier developed a prototype secure mailing list solution called SELS (Secure Email List Services) based on proxy encryption techniques [20], which enables the transformation of cipher-text from one key to another without revealing the plain-text. Emails exchanged using SELS are ensured confidenti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2014
2014

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…The Palantir system provides the collaborative workspace for discussions and data sharing among incident investigators, as seen in Figure 4. Collaboration mechanisms in the workspace include a data repository for log files, network traces, and other forensic data, a wiki for providing an overview of the incident for new members, documenting incident details, and keeping a timestamped incident notebook, secure instant messaging for real-time discussions, secure email lists [7,19,20] for ongoing discussions, anonymization tools [33] for sanitizing data before it is shared, analysis tools [10], and visualization tools [36].…”
Section: Design and Implementationmentioning
confidence: 99%
“…The Palantir system provides the collaborative workspace for discussions and data sharing among incident investigators, as seen in Figure 4. Collaboration mechanisms in the workspace include a data repository for log files, network traces, and other forensic data, a wiki for providing an overview of the incident for new members, documenting incident details, and keeping a timestamped incident notebook, secure instant messaging for real-time discussions, secure email lists [7,19,20] for ongoing discussions, anonymization tools [33] for sanitizing data before it is shared, analysis tools [10], and visualization tools [36].…”
Section: Design and Implementationmentioning
confidence: 99%
“…Later, two bidirectional schemes without pairings in the random oracle were proposed in . Bidirectional PRE scheme is a very useful primitive in practice, especially in collaborative tasks using email lists , but the main problem is that it usually needs to run a multiparty protocol among three users beforehand to generate a re‐encryption key(i.e., two users with their own secret keys and a proxy with nothing as inputs: after the execution of the protocol, the proxy obtains the corresponding re‐encryption key, the two users obtains nothing). Canetti et al , left an open problem to construct a chosen ciphertext attacks (CCA) secure unidirectional PRE scheme (without parings).…”
Section: Introductionmentioning
confidence: 99%