Skip to main content

Bankable Postage for Network Services

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2896))

Abstract

We describe a new network service, the ”ticket server”. This service provides ”tickets” that a client can attach to a request for a network service (such as sending email or asking for a stock quote). The recipient of such a request (such as the email recipient or the stockbroker) can use the ticker server to verify that the ticket is valid and that the ticket hasn’t been used before. Clients can acquire tickets ahead of time, independently of the particular network service request. Clients can maintain their stock of tickets either on their own storage, or as a balance recorded by the ticket server. Recipients of a request can tell the ticket server to refund the attached ticket to the original client, thus incrementing the client’s balance at the ticket server. For example, an email recipient might do this if the email wasn’t spam. This paper describes the functions of the ticket server, defines a cryptographic protocol for the ticket server’s operations, and outlines an efficient implementation for the ticket server.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abadi, M., Glew, N., Horne, B., Pinkas, B.: Certified Email with a Light On-Line Trusted Third Party: Design and Implementation. In: Proceedings of the Eleventh International World Wide Web Conference, May 2002, pp. 387–395 (2002)

    Google Scholar 

  2. Abadi, M., Burrows, M., Manasse, M., Wobber, E.: Moderately Hard, Memory-bound Functions. In: Proceedings of the 10th Annual Network and Distributed System Security Symposium, February 2003, pp. 25–39 (2003)

    Google Scholar 

  3. Von Ahn, L., Blum, M., Hopper, N., Langford, A.: Captcha, At http://www.captcha.net

  4. Androutsopoloulos, A., et al.: An experimental comparison of naïve Bayesian and keyword- based anti-spam filtering with personal e-mail messages. In: Proceedings of SIGIR-2000, 23rd ACM International Conference on Research and Development in Information Retrieval, pp. 160–167. ACM Press, New York (2000)

    Google Scholar 

  5. AOL press release on Business Wire, as reported by the Washington Post (February 2003), http://sites.stockpoint.com/wpost/newspaperbw.asp?dispnav=&Story=20030220/051b1753.xml

  6. Back, A.: HashCash (1997), http://www.cyberspace.org/~adam/hashcash

  7. Bahreman, A., Tygar, J.D.: Certified electronic mail. In: Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 1994, pp. 3–19 (1994)

    Google Scholar 

  8. Camram, At http://www.camram.org

  9. Cranor, L., LaMacchia, B.: Spam! Commun. ACM 41(8), 74–83 (1998)

    Article  Google Scholar 

  10. Dwork, C., Goldberg, A., Naor, M.: On memory-bound functions for fighting spam. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 426–444. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  11. Dwork, C., Naor, M.: Pricing via processing or combating junk mail. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 139–147. Springer, Heidelberg (1993)

    Google Scholar 

  12. Fahlman, S.: Selling interrupt rights: a way to control unwanted e-mail and telephone calls. IBM Systems Journal 41(4), 759–766 (2002)

    Article  Google Scholar 

  13. Gabber, E., et al.: Curbing junk e-mail via secure classification. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 198–213. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  14. Glassman, S., Manasse, M., Abadi, M., Gauthier, P., Sobalvarro, P.: The Millicent protocol for inexpensive electronic commerce. In: Proceedings of the Fourth International World Wide Web Conference, pp. 603–618. O’Reilly and Associates, Sebastopol (1995)

    Google Scholar 

  15. Ioannidis, J.: Fighting spam by encapsulating policy in email addresses. In: Proceedings Symposium on Network and Distributed Systems Security 2003, February 2003, pp. 17–24 (2003)

    Google Scholar 

  16. Kohl, J., Neuman, C.: The Kerberos network authentication service, At http://www.rfc-editor.org/rfc/rfc1510.txt

  17. Menezes, A., Van Oorschot, P., Vanstone, S.: Handbook of applied cryptography. CRC Press, Boca Raton (1996)

    Book  Google Scholar 

  18. McCurley, K.: Deterrence measures for spam. slides presented at the RSA conference (January 1998), http://www.almaden.ibm.com/cs/k53/pmail/

  19. Mullender, S., Tannenbaum, A.: The design of a capability-based operating system. Computer Journal 29(4), 289–299 (1986)

    Article  Google Scholar 

  20. Templeton, B.: E-stamps, http://www.templetons.com/brad/spume/estamps.html (undated)

  21. Tygar, J.D., Yee, B., Heintze, N.: Cryptographic Postage Indicia. In: Jaffar, J., Yap, R.H.C. (eds.) ASIAN 1996. LNCS, vol. 1179, pp. 378–391. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  22. Zhou, J., Gollmann, D.: Certified electronic mail. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) ESORICS 1996. LNCS, vol. 1146, pp. 160–171. Springer, Heidelberg (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T. (2003). Bankable Postage for Network Services. In: Saraswat, V.A. (eds) Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation. ASIAN 2003. Lecture Notes in Computer Science, vol 2896. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-40965-6_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-40965-6_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-20632-3

  • Online ISBN: 978-3-540-40965-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics