2005
DOI: 10.1007/11556992_3
|View full text |Cite
|
Sign up to set email alerts
|

Time-Based Release of Confidential Information in Hierarchical Settings

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2006
2006
2009
2009

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Specifically, the schemes of [4] and [23] use the tree-like structure of [6] backwards, to construct previous trapdoors, while [8] uses an inverted hash chain, similarly to the S/Key system [15]. These approaches have a high communication cost, while the root of the tree-like structure and the hash chain, respectively, correspond to the last available trapdoor to be published, implying an upper bound on the "lifetime" of the system.…”
Section: Introductionmentioning
confidence: 99%
“…Specifically, the schemes of [4] and [23] use the tree-like structure of [6] backwards, to construct previous trapdoors, while [8] uses an inverted hash chain, similarly to the S/Key system [15]. These approaches have a high communication cost, while the root of the tree-like structure and the hash chain, respectively, correspond to the last available trapdoor to be published, implying an upper bound on the "lifetime" of the system.…”
Section: Introductionmentioning
confidence: 99%
“…The same situation applies for rapid dissemination of freshly published, crucial or highly priced, and formerly secret information [18], such as stock market values, strategic business plans, news agencies timed publications, licensed software updates, etc. Considering the size of the confidential information is significantly larger than the size of an encryption key (which is often the case), timely distribution of information to a large and distributed community of users is often impeded by network traffic jams.…”
Section: More Applicationsmentioning
confidence: 98%
“…no communication is needed between the agent and other entities. Many applications of TRE are discussed [5,6,10,17,18]. For examples, [10] talks about asking a broker to sell a stock at a particular future time, and [17] gives an application in certified email system.…”
Section: Timed-release Encryptionmentioning
confidence: 99%
See 1 more Smart Citation