Practical Implementation of Secure Email System Based on IBE, DNS and Proxy Service

被引:0
|
作者
Balakrishnan, Suresh Kumar [1 ]
Raj, Jagathy V. P. [2 ]
机构
[1] Indira Gandhi Natl Open Univ, Sch Comp & Informat Sci, New Delhi, India
[2] Cochin Univ Sci & Technol, Sch Management Studies, Kochi, India
关键词
Identity based Encryption; secure email system; Elliptic Curve; figure print authentication;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Now a days, email has become the most widely used communication system in daily life. To improve security and efficiency of email system, most of the current email system adopts S/MIME or PGP as the mechanism implement security. But these systems are not efficient because of the high cost for public key certificate management and the problem on credential trust management. This paper presents a complete implementation of a practical secure email system based on Identity Based Encryption (IBE) which uses DNS as the infrastructure for public key exchange, a proxy service for encryption/decryption on behalf of user and a secure key token or fingerprint authentication system for user authentication.
引用
收藏
页码:1801 / 1806
页数:6
相关论文
共 50 条
  • [31] WATCHOUT: A Practical Secure Pedestrian Warning System based on Smartphones
    Ou, Runmin
    Peng, Fang
    Zhang, Taige
    Li, Jiawei
    Xu, Jincao
    Chen, Yanjiao
    Yin, Xiaoyan
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [32] Web based Online Bakery System with Short Messaging Service and Email Notification
    Razak, Nur Farahin A.
    Mustaffa, Noorfa H.
    Radzi, Nor Haizan Mohamed
    Sallehuddin, Roselina
    Bazin, Erne N.
    2017 6TH ICT INTERNATIONAL STUDENT PROJECT CONFERENCE (ICT-ISPC), 2017,
  • [33] A Perception System for DNS Root Service Status Based on Active and Passive Monitoring
    Dong, Guozhong
    Guo, Hao
    Wu, Hualong
    WEB AND BIG DATA, APWEB-WAIM 2024, PT V, 2024, 14965 : 378 - 382
  • [34] Design and Implementation of a SFTP Protocol Audit System Based on Proxy Technology
    Wu, Kehe
    Zhang, Ning
    Jiang, Yongjun
    Liang, Yi
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 334 - 339
  • [35] Design and Implementation of a Proxy-based Internet Access Control System
    Cai, Xin
    Gao, Fuxiang
    Sun, Xiaojuan
    Wu, Jin
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 108 - 110
  • [36] A proxy caching system based on multimedia streaming service over the Internet
    Guo, H
    Zhou, JL
    Dong, Z
    Yu, SS
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2004, PT 2, PROCEEDINGS, 2004, 3332 : 439 - 446
  • [37] DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain
    Gao, Tianfu
    Dong, Qingkuan
    SENSORS, 2023, 23 (14)
  • [38] Design and Implementation of an IoT Based Secure Biometric Authentication System
    Joshy, Annies
    Jalaja, M. J.
    2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, INFORMATICS, COMMUNICATION AND ENERGY SYSTEMS (SPICES), 2017,
  • [39] Design and Implementation of Secure Instant Messaging System Based on MSN
    Zhang Bin
    Feng Meng
    Xiong Hou-ren
    Hu Dian-you
    ISCSCT 2008: INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY, VOL 1, PROCEEDINGS, 2008, : 38 - 41
  • [40] Design and Implementation a Secure Workflow System Based on PKI/PMI
    Yan Kai
    Jiang Chao-hui
    FIFTH INTERNATIONAL CONFERENCE ON MACHINE VISION (ICMV 2012): ALGORITHMS, PATTERN RECOGNITION AND BASIC TECHNOLOGIES, 2013, 8784