KeyForge and TimeForge: Fixing Email Deniability
This was actually the opposite of what I expected.
Since most SMTP servers would still accept spoofed email even when DKIM public key is present among DNS records (it's mostly used to increase spam score), I was expecting the article to focus on closing that gap.
I was pleasantly surprised to read that they want to introduce a signing scheme that, instead, wants to introduce better deniability while keeping cryptographically secure protection against email spoofing.
They achieve that through publishing private keys used for message exchange after a short period, thus making historical emails trivial to forge, and thus introducing easy deniability.
To simplify key management, they introduce a tree-based private key storage, keyed by time range, with an interesting property that parent keys automatically reveal child keys as well, while—crucially—keeping key size limited for transfer purposes!