Mathematical Problems and Algorithms for Timed-release Encryption

نویسندگان

  • Konstantinos Chalkias
  • Foteini Baldimtsi
  • Dimitrios Hristu-Varsakelis
  • George Stephanides
چکیده

There are nowdays various e-business applications, such as sealedbid auctions and electronic voting, that require time-delayed decryption of encrypted data. The literature offers at least three main categories of protocols that provide such timed-release encryption (TRE). They rely either on forcing the recipient of a message to solve some time-consuming, non-paralellizable problem before being able to decrypt, or on the use of a trusted entity responsible for providing a piece of information which is necessary for decryption. This article discusses the mathematical background required for implementing TRE methods including factorization, quadratic residues and the bilinear Diffie-Hellman problems, along with a sample protocol for each of the approaches studied here. 2000 Mathematics Subject Classification: 11Y16, 14G50, 11D09, 11A51, 11A07.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography

In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...

متن کامل

Timed-Release and Key-Insulated Public Key Encryption

In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release public key encryption, and show that, despite several differences in its fo...

متن کامل

Timed-Release Cryptography

Let n be a large composite number. Without factoring n, the computation of a t (mod n) given a, t with gcd(a; n) = 1 and t < n can be done in t squarings modulo n. For t n (e.g., n > 2 and t < 2), no lower complexity than t squarings is known to ful ll this task. Rivest et al suggested to use such constructions as good candidates for realising timed-release crypto problems. We argue the necessi...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes

In this paper, we study timed-release cryptography with information-theoretic security. As fundamental cryptographic primitives with information-theoretic security, we can consider keyagreement, encryption, and authentication codes. Therefore, in this paper we deal with informationtheoretic timed-release security for all those primitives. Specifically, we propose models and formalizations of se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008