Timed-release cryptography

被引:0
|
作者
Mao, Wenbo [1 ,2 ]
机构
[1] Trusted E-Services Laboratory, HP Laboratories Bristol
[2] Hewlett-Packard Laboratories, Filton Road, Stoke Gifford, Bristol BS34 8QZ, United Kingdom
来源
HP Laboratories Technical Report | 2001年 / 37期
关键词
Computational complexity - Electronic document identification systems - Functions - Integer programming - Knowledge acquisition - Network protocols - Number theory - Probability - Problem solving;
D O I
暂无
中图分类号
学科分类号
摘要
Let n be a large composite number. Without factoring n, the validation of a2t (mod n) given a, t with gcd (a, n) = 1 and t 21024 and t 100), no lower complexity than t squarings is known to fulfil this task (even considering massive parallelisation). Rivest et al suggested to use such constructions as good candidates for realising timed-release crypto problems. We argue the necessity for zero-knowledge proof of the correctness of such constructions and propose the first practically efficient protocol for a realisation. Our protocol proves, in log2 t standard crypto operations, the correctness of (ae)2t (mod n) with respect to ae where e is an RSA encryption exponent. With such a proof, a Timed-release RSA Encryption of a message M can be given as a2t M (mod n) with the assertion that the correct decryption of the RSA ciphertext Me (mod n) can be obtained by performing t squarings modulo n starting from a. Timed-release RSA signatures can be constructed analogously.
引用
收藏
相关论文
共 50 条
  • [31] Timed-release computational secret sharing and threshold encryption
    Watanabe, Yohei
    Shikata, Junji
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (01) : 17 - 54
  • [32] Efficient and non-interactive timed-release encryption
    Cathalo, J
    Libert, B
    Quisquater, JJ
    INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 291 - 303
  • [33] SUSPENSION POLYMERIZATION FOR PREPARATION OF TIMED-RELEASE DOSAGE FORMS
    CROSWELL, RW
    BECKER, CH
    JOURNAL OF PHARMACEUTICAL SCIENCES, 1974, 63 (03) : 440 - 442
  • [34] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [35] A timed-release key management scheme for backward recovery
    Yoshida, Maki
    Mitsunari, Shigeo
    Fujiwara, Toru
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005, 2006, 3935 : 3 - 14
  • [36] Provably Secure Timed-Release Proxy Conditional Reencryption
    Fan, Chun-I
    Chen, Jun-Cheng
    Huang, Shi-Yuan
    Huang, Jheng-Jia
    Chen, Wen-Tsuen
    IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2291 - 2302
  • [37] Timed-Release Hierarchical Identity-Based Encryption
    Oshikiri, Toru
    Saito, Taiichi
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (11) : 148 - 154
  • [38] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [39] Timed-Release Encryption with Master Time Bound Key
    Choi, Gwangbae
    Vaudenay, Serge
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 167 - 179
  • [40] Design and release profile of timed-release coated granules of systemic insecticide
    Kimoto, Narutoshi
    Takahashi, Atsushi
    Inubushi, Kazuyuki
    JOURNAL OF PESTICIDE SCIENCE, 2007, 32 (04) : 402 - 406