2006
DOI: 10.1007/s10207-006-0084-5
|View full text |Cite
|
Sign up to set email alerts
|

Hierarchical time-based information release

Abstract: Rapid distribution of newly released confidential information is often impeded by network traffic jams, especially when the confidential information is either crucial or highly prized. This is the case for stock market values, blind auction bidding amounts, many large corporations'strategic business plans, certain news agencies'timed publications, and some licensed software updates. Hierarchical time-based information release (HTIR) schemes enable the gradual distribution of encrypted confidential information … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2008
2008

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 17 publications
(67 reference statements)
0
2
0
Order By: Relevance
“…IBE supports an efficient time-based unlock mechanism by treating the identities as time periods [4,27]. This approach supports only universal disclosure of encrypted documents since one trapdoor can decrypt all ciphertexts for a specific time; the inherent key-escrow property of IBE prohibits the encryption for a designated receiver.…”
Section: The Difficulty Of Converting Between Cle and Trementioning
confidence: 99%
See 1 more Smart Citation
“…IBE supports an efficient time-based unlock mechanism by treating the identities as time periods [4,27]. This approach supports only universal disclosure of encrypted documents since one trapdoor can decrypt all ciphertexts for a specific time; the inherent key-escrow property of IBE prohibits the encryption for a designated receiver.…”
Section: The Difficulty Of Converting Between Cle and Trementioning
confidence: 99%
“…The latter also formalizes the release-time confidentiality. The recovery of past time-dependent trapdoors from a current trapdoor was studied in [9] and [27], which employs a hash chain and a tree structure [6] respectively. The study of the pre-open capability in TRE was initiated in [24] and improved by [19].…”
Section: Timed-release Encryptionmentioning
confidence: 99%