Steps to Reducing Unwanted Traffic on the Internet Workshop Abstract
Pp. 9399 of the Proceedings
Lightweight Encryption for Email
Ben Adida, Susan Hohenberger, and Ronald L. Rivest, MIT
Abstract
Email encryption techniques have been available for
more than a decade, yet none has been widely deployed.
The problems of key generation, certification,
and distribution have not been pragmatically addressed.
We recently proposed a method for implementing a
Lightweight Public Key Infrastructure (PKI) for email
authentication using recent developments in identitybased
cryptography and today's existing Internet infrastructure.
While this solution works well for email authentication,
email encryption exhibits a different threat model
that requires special treatment. In this work, we discuss
how to achieve email encryption and present a realistic
deployment and adoption process, while respecting the
current functionality and expectations of email.
- View the full text of this paper in PDF, or the talk slides in PDF.
Until July 2006, you will need your USENIX membership identification in order to access the full papers. The Proceedings are published as a collective work, © 2005 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
|