This note was written in 2016. Rejected from PKC 2017, some of the ideas herein later developed into the Eurocrypt 2019 article Efficient verifiable delay functions. Other ideas, such as the construction of fading signatures, and a discussion on their (in)feasibility, never appeared in public work. In light of the recent development of time-sensitive cryptography, some of this content may have become of interest. The reader may notice that the notion of proof of time or knowledge essentially coincides with what is now known as a (trapdoor) verifiable delay function.This paper introduces proofs of time or knowledge, a new primitive in the field of time-sensitive cryptography pioneered by Rivest, Shamir and Wagner in 1996. A party, Alice, has...
In this paper, we propose a new notion of timed encryption, in which the encryption is secure withi...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
We use standard linear-time temporal logic to specify cryptographic protocols, model the system pene...
Timestamping is an important cryptographic primitive with numerous applications. The availability of...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
We construct a verifiable delay function (VDF) by showing how the Rivest-Shamir-Wagner time-lock puz...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
We present the first treatment of non-interactive publicly-verifiable timestamping schemes in the Un...
Abstract. Time-lock encryption is a method to encrypt a message such that it can only be decrypted a...
International audienceWe propose a framework for timing attacks, based on (a variant of) the applied...
Abstract. We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus...
We present the first treatment of non-interactive publicly-verifiable timestamping schemes in the Un...
We construct a verifable delay function (VDF) by showing how the Rivest-Shamir-Wagner time-lock puzz...
The notion of time is prerequisite for describing and verifying the security properties of key manag...
In this paper, we propose a new notion of timed encryption, in which the encryption is secure withi...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
We use standard linear-time temporal logic to specify cryptographic protocols, model the system pene...
Timestamping is an important cryptographic primitive with numerous applications. The availability of...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
A verifiable timed signature (VTS) scheme allows one to time-lock a signature on a known message for...
We construct a verifiable delay function (VDF) by showing how the Rivest-Shamir-Wagner time-lock puz...
Time travel has always been a fascinating topic in literature and physics. In cryptography, one may ...
We present the first treatment of non-interactive publicly-verifiable timestamping schemes in the Un...
Abstract. Time-lock encryption is a method to encrypt a message such that it can only be decrypted a...
International audienceWe propose a framework for timing attacks, based on (a variant of) the applied...
Abstract. We propose a framework for timing attacks, based on (a variant of) the applied-pi calculus...
We present the first treatment of non-interactive publicly-verifiable timestamping schemes in the Un...
We construct a verifable delay function (VDF) by showing how the Rivest-Shamir-Wagner time-lock puzz...
The notion of time is prerequisite for describing and verifying the security properties of key manag...
In this paper, we propose a new notion of timed encryption, in which the encryption is secure withi...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
We use standard linear-time temporal logic to specify cryptographic protocols, model the system pene...