In this dissertation we define, construct, and build on cryptographic objects that simulate the elapsing of time. This work concerns with tasks that involve the cryptographic equivalent of a reference clock and allow one to prove that a certain amount of time units is passed or to hide a secret for a predetermined amount of time. More specifically, we present the following cryptographic primitives. (1) Incremental Proofs of Sequential Work allow a prover to convince a verifier that a certain amount of sequential work has been performed. Proofs can be passed on to new provers or forked to new machines almost for free. Our constructions are essentially optimal in terms of prover space and time complexity. (2) Homomorphic Time-Lock Pu...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
Dans ce mémoire, nous proposons des protocoles cryptographiques d'échange de clef, de mise en gage, ...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Time-release cryptography requires problems that take a long time to solve and take just as long eve...
This note was written in 2016. Rejected from PKC 2017, some of the ideas herein later developed into...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else ...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a predetermined point in ...
Virtually all of modern cryptography relies on unproven assumptions. This is necessary, as the exist...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
Dans ce mémoire, nous proposons des protocoles cryptographiques d'échange de clef, de mise en gage, ...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Time-release cryptography requires problems that take a long time to solve and take just as long eve...
This note was written in 2016. Rejected from PKC 2017, some of the ideas herein later developed into...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else ...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a predetermined point in ...
Virtually all of modern cryptography relies on unproven assumptions. This is necessary, as the exist...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
The research in complexity theory, for a long time now, has been conscious of memory as a resource i...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
Dans ce mémoire, nous proposons des protocoles cryptographiques d'échange de clef, de mise en gage, ...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-...