Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else can unlock it until a certain time elapses. Nevertheless, existing schemes are not suitable for the case where a server is given multiple instances of a puzzle scheme at once and it must unlock them at different points in time. If the schemes are naively used in this setting, then the server has to start solving all puzzles as soon as it receives them, that ultimately imposes significant computation cost and demands a high level of parallelisation. We put forth and formally define a primitive called “multi-instance time-lock puzzle” which allows composing a puzzle’s instances. We propose a candidate construction: “chained time-lock puzzle” (C...
We introduce a new primitive named Delay Encryption, and give an efficient instantation based on iso...
Many existing timed-release encryption schemes uses time-lock puzzles to avoid relying on a trusted ...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such ...
Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a predetermined point in ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Recently, time-based primitives such as time-lock puzzles (TLPs) and verifiable delay functions (VDF...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to b...
International audienceTimed commitments [Boneh and Naor, CRYPTO 2000] are the timed analogue of stan...
We introduce a new primitive named Delay Encryption, and give an efficient instantation based on iso...
Many existing timed-release encryption schemes uses time-lock puzzles to avoid relying on a trusted ...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such ...
Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a predetermined point in ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Recently, time-based primitives such as time-lock puzzles (TLPs) and verifiable delay functions (VDF...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to b...
International audienceTimed commitments [Boneh and Naor, CRYPTO 2000] are the timed analogue of stan...
We introduce a new primitive named Delay Encryption, and give an efficient instantation based on iso...
Many existing timed-release encryption schemes uses time-lock puzzles to avoid relying on a trusted ...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...