2021
DOI: 10.1007/978-3-662-64331-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Multi-instance Publicly Verifiable Time-Lock Puzzle and Its Applications

Abstract: Time-lock puzzles are elegant protocols that enable a party to lock a message such that no one else can unlock it until a certain time elapses. Nevertheless, existing schemes are not suitable for the case where a server is given multiple instances of a puzzle scheme at once and it must unlock them at different points in time. If the schemes are naively used in this setting, then the server has to start solving all puzzles as soon as it receives them, that ultimately imposes significant computation cost and dem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 70 publications
0
3
0
Order By: Relevance
“…Since service providers are required to perform computation on a timelock puzzle for each lended resource, they may need high computation power for some use cases. The methods proposed in (Abadi & Kiayias, 2021;Malavolta & Thyagarajan, 2019) can be used to perform the evaluation of time-lock puzzles for multiple bid' s with the cost of a single time-lock puzzle for some scenarios. Another possible optimization is related to using updatable anonymous credential concept.…”
Section: Discussion On Further Optimizationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Since service providers are required to perform computation on a timelock puzzle for each lended resource, they may need high computation power for some use cases. The methods proposed in (Abadi & Kiayias, 2021;Malavolta & Thyagarajan, 2019) can be used to perform the evaluation of time-lock puzzles for multiple bid' s with the cost of a single time-lock puzzle for some scenarios. Another possible optimization is related to using updatable anonymous credential concept.…”
Section: Discussion On Further Optimizationsmentioning
confidence: 99%
“…Homomorphic time-lock puzzles are also utilized to solve more than one puzzles at once to optimize the puzzle-solving phase. (Abadi & Kiayias, 2021) constructs a time-lock puzzle scheme that can generate a single puzzle for multiple secret values with different opening so that single sequential computation can evaluate a puzzle to multiple secret values at different points of the computation. (Chvojka, Jager, Slamanig & Striecks, 2021) further improves this design.…”
Section: Related Workmentioning
confidence: 99%
“…Using a slow and easy to verify function with exponentiation [ 15 ] based calculations in a finite group can be constructed a decodable verifiable delay function. Boneh et al propose a simple exponentiation-based decodable verifiable delay functions with bounded pre-computation.…”
Section: Descriptions Of Verifiable Delay Functionsmentioning
confidence: 99%