Efficient and non-interactive timed-release encryption

被引:0
|
作者
Cathalo, J [1 ]
Libert, B [1 ]
Quisquater, JJ [1 ]
机构
[1] Catholic Univ Louvain, Crypto Grp, B-1348 Louvain, Belgium
关键词
timed-release encryption; formal models; provable security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper revisits the important problem of sending a message "into the future" in such a way that no communication is needed between the server and other entities. This problem was recently re-investigated by Blake and Chan who showed a scalable non-interactive solution without considering a formal security model. We fill this gap by introducing a new stringent model tailored to the non-interactive setting. We then propose a new construction fitting our model and we show that it is more efficient than the recent non-interactive proposal (for which we also give a security proof in our model). We then explain how to provide our scheme and the one of Blake and Chan with an additional security property that strengthens the anonymity of receivers.
引用
收藏
页码:291 / 303
页数:13
相关论文
共 50 条
  • [41] Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments
    Chvojka, Peter
    Jager, Tibor
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2023, 13940 LNCS : 500 - 529
  • [42] Simple, Fast, Efficient, and Tightly-Secure Non-malleable Non-interactive Timed Commitments
    Chvojka, Peter
    Jager, Tibor
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT I, 2023, 13940 : 500 - 529
  • [43] Public-key encryption with non-interactive opening
    Damgard, Ivan
    Hofheinz, Dennis
    Kiltz, Eike
    Thorbek, Rune
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 239 - +
  • [44] SKENO: Secret key encryption with non-interactive opening
    Chen, Jiageng
    Emura, Keita
    Miyaji, Atsuko
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2015, 9 (02) : 63 - 74
  • [45] An Efficient Non-interactive Multi-client Searchable Encryption with Support for Boolean Queries
    Sun, Shi-Feng
    Liu, Joseph K.
    Sakzad, Amin
    Steinfeld, Ron
    Yuen, Tsz Hon
    COMPUTER SECURITY - ESORICS 2016, PT I, 2016, 9878 : 154 - 172
  • [46] Efficient Non-interactive Range Proof
    Yuen, Tsz Hon
    Huang, Qiong
    Mu, Yi
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    COMPUTING AND COMBINATORICS, PROCEEDINGS, 2009, 5609 : 138 - +
  • [47] Identity-based Encryption with Non-Interactive Opening
    范佳
    唐小虎
    康立
    路献辉
    JournalofShanghaiJiaotongUniversity(Science), 2008, 13 (06) : 670 - 674
  • [48] An Almost Non-interactive Order Preserving Encryption Scheme
    Guo, Jingjing
    Wang, Jianfeng
    Zhang, Zhiwei
    Chen, Xiaofeng
    INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC 2018), 2018, 11125 : 87 - 100
  • [49] Structured Encryption with Non-Interactive Updates and Parallel Traversal
    Lai, Russell W. F.
    Chow, Sherman S. M.
    2015 IEEE 35TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 2015, : 776 - 777
  • [50] Group Encryption: Non-interactive Realization in the Standard Model
    Cathalo, Julien
    Libert, Benoit
    Yung, Moti
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 179 - +