Abstract
Unsolicited and undesirable e-mail (spam) is a growing problem for Internet users and service providers. We present the Secure Internet Content Selection (SICS) protocol, an efficient cryptographic mechanism for spam-control, based on allocation of responsibility (liability). With SICS, e-mail is sent with a content label, and a cryptographic protocol ensures labels are authentic and penalizes falsely labeled e-mail (spam). The protocol supports trusted senders (penalized by loss of trust) and unknown senders (penalized financially). The recipient can determine the compensation amount for falsely labeled e-mail (spam). SICS is practical, with negligible overhead, gradual adoption path, and use of existing relationships; it is also flexible and appropriate for most scenarios, including deployment by end users and/or ISPs and support for privacy (including encrypted e-mail) and legitimate, properly labeled commercial e-mail. SICS improves on other crypto-based proposals for spam controls, and complements non-cryptographic spam controls.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 236–247. Springer, Heidelberg (1995), http://citeseer.nj.nec.com/article/anderson95robustness.html
The Coordinated Spam Reduction Initiative, Microsoft corporation (February 2004)
DesAutels, P. (ed.): Yang-hua Chu, Brian LaMacchia and Peter Lipp, PICS Signed Labels (DSig) 1.0 Specification, W3C Recommendation (May 1998), http://www.w3.org/TR/REC-DSig-label
Duchovni, V., Gilmore, J., Herzberg, A., Laurie, B., Metzger, P.: others, messages to the cryptography@metzdowd.com list (January 2004)
Dwork, C., Goldberg, A., Naor, M.: On Memory-Bound Functions for Fighting Spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)
Dwork, C., Naor, M.: Pricing via Processing or Combating Junk Mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)
Gabber, E., Jakobsson, M., Matias, Y., Mayer, A.: Curbing junk E-mail via secure classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)
Herzberg, A.: Micropayments. In: Kou, W. (ed.) Payment Technologies for E-Commerce, pp. 245–280. Springer, Heidelberg (2003)
Herzberg, A.: Controlling spam by secure internet content selection (full version) (in preparation)
McCurley, K.: Deterrence Measures for Spam. In: presented at the RSA Conference (January 1998)
Miller, J. (ed.): Tim Krauskopf, Paul Resnick and Win Treese, PICS Label Distribution Label Syntax and Communication Protocols Version 1.1, W3C Recommendation (October 1996), http://www.w3.org/TR/REC-PICS-labels
Miller, J. (ed.): Paul Resnick and David Singer, Rating Services and Rating Systems and Their Machine Readable Descriptions Version 1.1, W3C Recommendation (October 1996), http://www.w3.org/TR/REC-PICS-services
Ramsdell, B. (ed.): Request for comments 2633, S/MIME Version 3 Message Specification (June 1999)
Crocker, D.: Request For Comments 822, Standard for the Format of ARPA Internet Text Messages (August 1982), http://www.ietf.org/rfc/rfc822.txt
Schiavone, V., Brussin, D., Koenig, J., Cobb, S., Everett-Church, R.: Trusted Email Open Standard - A Comprehensive Policy and Technology Proposal for Email Reform, An ePrivacy Group White Paper (May 2003), available at http://www.eprivacygroup.net/teos/teos_release.pdf
Schwartz, A., Garfinkel, S.: Stopping Spam. O’Reilly & Associates, Sebastopol (1998)
Technical responses to spam, Taughnnock Networks whitepaper (November 2003)
An overview of E-Postage, Taughnnock Networks whitepaper (June 2003), Updated (February 2004)
Zimmerman, P.R.: The Official PGP User’s Guide. MIT Press, Boston (1995)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Herzberg, A. (2005). Controlling Spam by Secure Internet Content Selection. In: Blundo, C., Cimato, S. (eds) Security in Communication Networks. SCN 2004. Lecture Notes in Computer Science, vol 3352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30598-9_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-30598-9_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24301-4
Online ISBN: 978-3-540-30598-9
eBook Packages: Computer ScienceComputer Science (R0)