Third International Symposium on Information Assurance and Security 2007
DOI: 10.1109/isias.2007.4299754
|View full text |Cite
|
Sign up to set email alerts
|

Low-cost Anonymous Timed-Release Encryption

Abstract: We propose a new server-based efficient protocol for time-release encryption (TRE), or -as sometimes referred to -sending information "into the future". As with other recently-proposed schemes, ours is based on the use of bilinear pairings on any Gap Diffie-Hellman group, allowing absolute release time of the encrypted data. Our protocol possesses the required properties regarding user anonymity and server passivity. It also provides almost-costless scalability in settings with multiple time-servers, and impro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…Most of the recent TRE schemes are based on Identity-Based Encryption (IBE) [18] and bilinear map (e.g. [19]). In order to achieve efficient solutions, we avoid using expensive IBE-TRE schemes.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the recent TRE schemes are based on Identity-Based Encryption (IBE) [18] and bilinear map (e.g. [19]). In order to achieve efficient solutions, we avoid using expensive IBE-TRE schemes.…”
Section: Related Workmentioning
confidence: 99%
“…The Conditional Oblivious Transfer Protocol [9] was then proposed that provided anonymity to the content provider, but not the client during communication. Further approaches, such as New-TRE [23] propose non-authenticated, non-interactive server-based schema that may be implemented using multiple time-servers for further anonymity. This TA-based scheme is being manipulated for public-key encryption and non-interactive and secure server-client interaction across the Internet.…”
Section: Ii31 Timed-release Cryptology -An Alternative Ap-proachmentioning
confidence: 99%
“…In 1996, Rivest et al 4 first proposed two preliminary TRE construction schemes, the first is TLP scheme based on factorization problem, and the second is the sender issues time and message to the agent, which laid the theoretical foundation for the sustainable research of TRE. So far, the construction of TRE scheme includes TLP [5][6][7][8][9][10] , agents [11][12][13][14][15][16][17] and other methods [18][19][20][21][22][23] . In the TRE scheme constructed based on TLP, the decryption key is hidden in a mathematical formula.…”
Section: Introductionmentioning
confidence: 99%