Security Definitions on Time-Lock Puzzles

被引:1
作者
Hiraga, Daiki [1 ]
Hara, Keisuke [1 ,2 ]
Tezuka, Masayuki [1 ]
Yoshida, Yusuke [1 ]
Tanaka, Keisuke [1 ]
机构
[1] Tokyo Inst Technol, Tokyo, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020 | 2021年 / 12593卷
关键词
D O I
10.1007/978-3-030-68890-5_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Time-lock puzzles allow one to encapsulate a message for a pre-determined amount of time. The message is required to be concealed from any algorithm running in parallel time less than the pre-determined amount of time. In the previous works, the security of time-lock puzzles was formalized in an indistinguishability manner. However, it is unclear whether it directly meets the security requirements of time-lock puzzles. In this work, we define semantic security for time-lock puzzles, which captures the security requirements of the time-lock puzzle more directly. We consider three computational restrictions of an adversary and see how the security relationship changes. At first, in the traditional setting, we observe that it is difficult to prove that the semantic security implies the indistinguishability, same as the opposite implication. Secondly, in a slightly relaxed setting, we show that it is possible to prove that the semantic security implies the indistinguishability. By contrast, we observe that it is difficult to prove the opposite implication. Thirdly, in the more relaxed setting, we show that it is possible to prove that semantic security is equivalent to the indistinguishability. This shows that an indistinguishability meets the security requirements of time-lock puzzles in a certain restriction.
引用
收藏
页码:3 / 15
页数:13
相关论文
共 11 条
[1]   Time-Lock Puzzles from Randomized Encodings [J].
Bitansky, Nir ;
Goldwasser, Shafi ;
Jain, Abhishek ;
Paneth, Omer ;
Vaikuntanathan, Vinod ;
Waters, Brent .
ITCS'16: PROCEEDINGS OF THE 2016 ACM CONFERENCE ON INNOVATIONS IN THEORETICAL COMPUTER SCIENCE, 2016, :345-356
[2]   Succinct Randomized Encodings and their Applications [J].
Bitansky, Nir ;
Garg, Sanjam ;
Lin, Huijia ;
Pass, Rafael ;
Telang, Sidharth .
STOC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON THEORY OF COMPUTING, 2015, :439-448
[3]   Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles [J].
Brakerski, Zvika ;
Doettling, Nico ;
Garg, Sanjam ;
Malavolta, Giulio .
THEORY OF CRYPTOGRAPHY, TCC 2019, PT II, 2019, 11892 :407-437
[4]  
Dwork C., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P139
[5]  
Ephraim Naomi., 2020, Report 2020/779, P779
[6]  
Garg S, 2013, STOC'13: PROCEEDINGS OF THE 2013 ACM SYMPOSIUM ON THEORY OF COMPUTING, P467
[7]   How to build time-lock encryption [J].
Liu, Jia ;
Jager, Tibor ;
Kakvi, Saqib A. ;
Warinschi, Bogdan .
DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (11) :2549-2586
[8]  
Mahmoody M, 2011, LECT NOTES COMPUT SC, V6841, P39, DOI 10.1007/978-3-642-22792-9_3
[9]   Homomorphic Time-Lock Puzzles and Applications [J].
Malavolta, Giulio ;
Thyagarajan, Sri Aravinda Krishnan .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 :620-649
[10]  
May T., 1993, Timed-release crypto