2010
DOI: 10.1007/978-3-642-15317-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Time-Specific Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(22 citation statements)
references
References 23 publications
0
22
0
Order By: Relevance
“…In particular, we neither need trusted third parties, nor have a considerable computational overhead for decryption. Time-lock puzzles and proofs of (sequential) work [24,29,34,35,58,59,65,66] are computational problems that can not be solved without running a computer continuously for a certain time. In a sense, our computational reference clocks can be seen as algorithms that continuously and publicly solve publicly verifiable [59] instances of an infinite sequence of time-lock puzzles.…”
Section: Related Work and Further Applications Of Time-lock Encryptionmentioning
confidence: 99%
“…In particular, we neither need trusted third parties, nor have a considerable computational overhead for decryption. Time-lock puzzles and proofs of (sequential) work [24,29,34,35,58,59,65,66] are computational problems that can not be solved without running a computer continuously for a certain time. In a sense, our computational reference clocks can be seen as algorithms that continuously and publicly solve publicly verifiable [59] instances of an infinite sequence of time-lock puzzles.…”
Section: Related Work and Further Applications Of Time-lock Encryptionmentioning
confidence: 99%
“…Even though Bethencourt et al [5] gave a bitwise-matching method to implement integer comparison based on CP-ABE scheme, this method unfortunately is not efficient enough for practical applications. In addition, Time-specific encryption (TSE) [15] and multi-dimensional range queries over encrypted data (MRQED) [18] are, in essence, constructed on the similar bitwise approach with BSW's CP-ABE scheme, which makes use of a policy tree (consists of 0/1 branches) on equal matching to realize the integer comparison.…”
Section: Related Workmentioning
confidence: 99%
“…Being an encryption scheme with enhanced time control mechanism, SUE can be applied in various other cryptographic primitives such as time-release encryption [14] and key-insulated encryption [6] to provide better security guarantees.…”
Section: Introductionmentioning
confidence: 99%