Time-Lock Puzzles (TLPs) are a powerful tool for concealing messages until a predetermined point in time. When solving multiple puzzles, it becomes crucial to have the ability to batch-solve puzzles, i.e., simultaneously open multiple puzzles while working to solve a single one . Unfortunately, all previously known TLP constructions equipped for batch solving rely on super-polynomially secure indistinguishability obfuscation, making them impractical. In light of this challenge, we present novel TLP constructions that offer batch-solving capabilities without using heavy cryptographic hammers. Our proposed schemes are simple and concretely efficient, and they can be constructed based on well-established cryptographic assumptions based on...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount o...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such ...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to b...
Recently, time-based primitives such as time-lock puzzles (TLPs) and verifiable delay functions (VDF...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
We introduce a new primitive named Delay Encryption, and give an efficient instantation based on iso...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount o...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...
Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else ...
Timed-release encryption (TRE) makes it possible to send information ``into the future\u27\u27 such ...
Time-Lock Puzzles (TLPs) are cryptographic protocols that enable a client to lock a message in such ...
A Time-lock puzzle (TLP) sends information into the future: a predetermined number of sequential com...
Time-lock puzzles are a mechanism for sending messages to the future , by allowing a sender to quic...
We construct a publicly verifiable protocol for proving computational work based on collision-resist...
Achieving fairness and soundness in non-simultaneous rational secret sharing schemes has proved to b...
Recently, time-based primitives such as time-lock puzzles (TLPs) and verifiable delay functions (VDF...
Time-lock puzzles---problems whose solution requires some amount of sequential effort---have recentl...
We show how to combine a fully-homomorphic encryption scheme with linear decryption and a linearly-...
In this dissertation we define, construct, and build on cryptographic objects that simulate the ela...
We introduce a new primitive named Delay Encryption, and give an efficient instantation based on iso...
We present a definition of an ideal timestamping functionality that maintains a timestamped record of...
A (computational) client puzzle scheme enables a client to prove to a server that a certain amount o...
Pseudorandom functions (PRFs) are the building blocks of symmetric-key cryptography. Almost all cent...