Time-lock puzzles
نویسنده
چکیده
A time-lock puzzle is merely an encryption scheme that has no secret key. The secret key in an encryption scheme is intended to allow efficient decryption only for the holder of the key. If the sender wishes the receiver to be the only receiver of the message, he or she should use a secure encryption scheme on top of the time-lock puzzle. In a time-lock puzzle, “efficient” decryption (in a certain sense) is neither desired nor necessary; any decryption should be “inefficient” (that is, should require a large amount of resources).
منابع مشابه
Time-Lock Puzzles in the Random Oracle Model
A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until enough time has elapsed for the puzzle to be solved. For timelock puzzles to be useful, generating a puzzle should take less time than solving it. Since adversaries may have access to many more computers than honest solvers, massive...
متن کاملPseudonymous Secure Computation from Time-Lock Puzzles
In standard models of secure computation, point-to-point channels between parties are assumed to be authenticated by some pre-existing means. In other cases, even stronger pre-existing setup—e.g., a public-key infrastructure (PKI)—is assumed. These assumptions are too strong for open, peer-to-peer networks, where parties do not necessarily have any prior relationships and can come and go as the...
متن کاملTime-lock puzzles and timed-release Crypto
Our motivation is the notion of \timed-release crypto," where the goal is to encrypt a message so that it can not be decrypted by anyone, not even the sender, until a pre-determined amount of time has passed. The goal is to \send information into the future." This problem was rst discussed by Timothy May [6]. What are the applications of \timed-release crypto"? Here are a few possibilities (som...
متن کاملEfficient Modular Exponentiation-Based Puzzles for Denial-of-Service Protection
Client puzzles are moderately-hard cryptographic problems — neither easy nor impossible to solve — that can be used as a countermeasure against denial of service attacks on network protocols. Puzzles based on modular exponentiation are attractive as they provide important properties such as non-parallelisability, deterministic solving time, and linear granularity. We propose an efficient client...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015