Cryptographic primitive of timed-release encryption (TRE) enables the sender to encrypt a message which only allows the designated receiver to decrypt after a designated time. Combined with other encryption technologies, TRE technology is applied to a variety of scenarios, including regularly posting on the social network and online sealed bidding. Nowadays, in order to control the decryption time while maintaining anonymity of user identities, most TRE solutions adopt a noninteractive time server mode to periodically broadcast time trapdoors, but because these time trapdoors are generated with fixed time server’s private key, many “ciphertexts” related to the time server’s private key that can be cryptanalyzed are generated, which poses a ...
The random oracle model is an idealized theoretical model that has been successfully used for design...
This thesis is divided into two distinct parts. The first part of the thesis explores security issue...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
In this paper, we propose a new notion of timed encryption, in which the encryption is secure withi...
Abstract: We propose a new server-based protocol for timed-release encryption (TRE), sometimes refer...
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption ...
Timed-Release Encryption (TRE) (proposed by May in 1993)prevents even a legitimate recipient decrypt...
Abstract—Timed-Release Encryption(TRE) is an encryption mechanism that allows a receiver to decrypt ...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Timed-release encryption allows senders to send a message to a receiver which cannot decrypt until a...
The notion of “sending a secret message to the future” has been around for over a decade. Despite th...
. We consider the problem of sending messages "into the future. " Previous constructions f...
In this paper, we study timed-release cryptography with information-theoretic security. As fundament...
This paper revisits the important problem of sending a message "into the future" in such a way that ...
The random oracle model is an idealized theoretical model that has been successfully used for design...
This thesis is divided into two distinct parts. The first part of the thesis explores security issue...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...
In this paper, we propose a new notion of timed encryption, in which the encryption is secure withi...
Abstract: We propose a new server-based protocol for timed-release encryption (TRE), sometimes refer...
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption ...
Timed-Release Encryption (TRE) (proposed by May in 1993)prevents even a legitimate recipient decrypt...
Abstract—Timed-Release Encryption(TRE) is an encryption mechanism that allows a receiver to decrypt ...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Timed-release encryption allows senders to send a message to a receiver which cannot decrypt until a...
The notion of “sending a secret message to the future” has been around for over a decade. Despite th...
. We consider the problem of sending messages "into the future. " Previous constructions f...
In this paper, we study timed-release cryptography with information-theoretic security. As fundament...
This paper revisits the important problem of sending a message "into the future" in such a way that ...
The random oracle model is an idealized theoretical model that has been successfully used for design...
This thesis is divided into two distinct parts. The first part of the thesis explores security issue...
A cryptographic scheme is \provably secure " if an attack onthescheme implies an attack on ...