{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:38Z","timestamp":1754157698768,"version":"3.41.2"},"reference-count":16,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005,12,1]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>As a value\u2010added service to deliver important data over the internet with guaranteed receipt for each successful delivery, certified email has been discussed for years and a number of research papers appeared in the literature. This paper aims to present two optimized multi\u2010party certified email protocols.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>Reviews two existing email protocols and provides a modified version to overcome their security flaws and weaknesses. Extends the two\u2010party protocol to a multi\u2010party scenario.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Both of the protocols have three major features. A sender could notify multiple recipients of the same information while only those recipients who acknowledged are able to get the information. Both the sender and the recipients can end a protocol run at any time without breach of fairness. The exchange protocols are optimized, each of which has only three steps, and the trusted third party will not be involved unless an exception (e.g. a network failure or a party's misbehavior) occurs.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>Provides a focus on a value\u2010added service \u2013 certified email.<\/jats:p><\/jats:sec>","DOI":"10.1108\/09685220510627250","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:23:52Z","timestamp":1168885432000},"page":"350-366","source":"Crossref","is-referenced-by-count":13,"title":["Optimized multi\u2010party certified email protocols"],"prefix":"10.1108","volume":"13","author":[{"given":"Jianying","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jose","family":"Onieva","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"doi-asserted-by":"crossref","unstructured":"Abadi, M., Glew, N., Horne, B. and Pinkas, B. (2002), \u201cCertified email with a light on\u2010line trusted third party: design and implementation\u201d, Proceedings of 2002 International World Wide Web Conference, Honolulu, HI, May, pp. 387\u201095.","key":"key2022021320331326500_b1","DOI":"10.1145\/511446.511497"},{"unstructured":"Ateniese, G., Medeiros, B. and Goodrich, M. (2001), \u201cTRICERT: distributed certified email schemes\u201d, Proceedings of Network and Distributed System Security Symposium, San Diego, CA, February.","key":"key2022021320331326500_b2"},{"doi-asserted-by":"crossref","unstructured":"Bao, F., Wang, G., Zhou, J. and Zhu, H. (2004), \u201cAnalysis and improvement of Micali's fair contract signing protocol\u201d, Lecture Notes in Computer Science 3108, Proceedings of 2004 Australasian Conference on Information Security and Privacy, Sydney, July, pp. 176\u201087.","key":"key2022021320331326500_b3","DOI":"10.1007\/978-3-540-27800-9_16"},{"doi-asserted-by":"crossref","unstructured":"Deng, R., Gong, L., Lazar, A. and Wang, W. (1996), \u201cPractical protocols for certified electronic mail\u201d, Journal of Network and Systems Management, Vol. 4 No. 3, pp. 279\u201097.","key":"key2022021320331326500_b4","DOI":"10.1007\/BF02139147"},{"doi-asserted-by":"crossref","unstructured":"ElGamal, T. (1985), \u201cA public\u2010key cryptosystem and a signature scheme based on discrete logarithms\u201d, IEEE Transactions on Information Theory, Vol. IT\u201031 No. 4, pp. 469\u201072.","key":"key2022021320331326500_b5","DOI":"10.1109\/TIT.1985.1057074"},{"doi-asserted-by":"crossref","unstructured":"Ferrer\u2010Gomila, J., Payeras\u2010Capella, M. and Huguet\u2010Rotger, L. (2002), \u201cA realistic protocol for multi\u2010party certified electronic mail\u201d, Lecture Notes in Computer Science 2433, Proceedings of Information Security Conference, Sao Paulo, September, pp. 210\u20109.","key":"key2022021320331326500_b6","DOI":"10.1007\/3-540-45811-5_16"},{"doi-asserted-by":"crossref","unstructured":"Kremer, S. and Markowitch, O. (2000), \u201cA multi\u2010party non\u2010repudiation protocol\u201d, Proceedings of 15th IFIP International Information Security Conference, Beijing, August, pp. 271\u201080.","key":"key2022021320331326500_b7","DOI":"10.1007\/978-0-387-35515-3_28"},{"doi-asserted-by":"crossref","unstructured":"Markowitch, O. and Kremer, S. (2000), \u201cA multi\u2010party optimistic non\u2010repudiation protocol\u201d, Lecture Notes in Computer Science, Proceedings of Third International Conference on Information Security and Cryptology, Seoul, December, pp. 109\u201022.","key":"key2022021320331326500_b8","DOI":"10.1007\/3-540-45247-8_9"},{"unstructured":"Micali, S. (1997), \u201cSimultaneous electronic transactions\u201d, US Patent No. 5666420, September.","key":"key2022021320331326500_b9"},{"doi-asserted-by":"crossref","unstructured":"Micali, S. (2003), \u201cSimple and fast optimistic protocols for fair electronic exchange\u201d, Proceedings of 22nd ACM Annual Symposium on Principles of Distributed Computing, Boston, MA, July, pp. 12\u201019.","key":"key2022021320331326500_b10","DOI":"10.1145\/872035.872038"},{"doi-asserted-by":"crossref","unstructured":"Mut\u2010Puigserver, M., Ferrer\u2010Gomila, J. and Huguet\u2010Rotger, L. (2000), \u201cCertified electronic mail protocol resistant to a minority of malicious third parties\u201d, Proceedings of IEEE INFOCOM, 3, Tel Aviv, March, pp. 1401\u20105.","key":"key2022021320331326500_b11","DOI":"10.1109\/INFCOM.2000.832537"},{"unstructured":"Onieva, J., Zhou, J. and Lopez, J. (2004), \u201cEnhancing certified email service for timeliness and multicast\u201d, Proceedings of 4th International Network Conference, Plymouth, pp. 327\u201036.","key":"key2022021320331326500_b12"},{"doi-asserted-by":"crossref","unstructured":"Zhou, J. (2004), \u201cOn the security of a multi\u2010party certified email protocol\u201d, Lecture Notes in Computer Science 3269, Proceedings of 2004 International Conference on Information and Communications Security, Malaga, October, pp. 40\u201052.","key":"key2022021320331326500_b13","DOI":"10.1007\/978-3-540-30191-2_4"},{"unstructured":"Zhou, J. and Gollmann, D. (1996a), \u201cA fair non\u2010repudiation protocol\u201d, Proceedings of 1996 IEEE Symposium on Security and Privacy, Oakland, CA, May, pp. 55\u201061.","key":"key2022021320331326500_b14"},{"doi-asserted-by":"crossref","unstructured":"Zhou, J. and Gollmann, D. (1996b), \u201cCertified electronic mail\u201d, Lecture Notes in Computer Science 1146, Proceedings of European Symposium on Research in Computer Security, September, pp. 160\u201071.","key":"key2022021320331326500_b15","DOI":"10.1007\/3-540-61770-1_35"},{"unstructured":"Zhou, J. and Gollmann, D. (1997), \u201cAn efficient non\u2010repudiation protocol\u201d, Proceedings of 10th IEEE Computer Security Foundations Workshop, Rockport, MA, June, pp. 126\u201032.","key":"key2022021320331326500_b16"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510627250","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627250\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220510627250\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:55Z","timestamp":1753402135000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/5\/350-366\/171821"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":16,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12,1]]}},"alternative-id":["10.1108\/09685220510627250"],"URL":"https:\/\/doi.org\/10.1108\/09685220510627250","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,12,1]]}}}