Skip to main content

Time-Lock Puzzle with Examinable Evidence of Unlocking Time

  • Conference paper
Security Protocols (Security Protocols 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1796))

Included in the following conference series:

Abstract

Rivest et. al. proposed a time-lock puzzle based on the RSA crypto algorithm. To unlock the puzzle a player has to perform a computation which has a well understood time complexity. However, in that puzzle scheme there is no way for a player to examine whether a puzzle has been constructed in good order and to play a puzzle may foolishly risk wasting a very lengthy time on trying to solve an intractable problem. This weakness prohibits the time-lock puzzle from any applications that involve distrusted parties (most imaginable applications do involve distrusted parties). We propose a new RSA-based time-lock puzzle which includes an efficient protocol to let a player examine the time needed for unlocking.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Blum, M.: Coin flipping by telephone: a protocol for solving impossible problems. In: Proceedings of 24th IEEE Computer Conference (CompCon), pp. 133–137 (1982)

    Google Scholar 

  2. Cohen, H.: A Course in Computational Algebraic Number Theory. Graduate Texts in Mathematics, vol. 138. Springer, Heidelberg (1993)

    Google Scholar 

  3. Pollard, J.M.: Monte Carlo method for index computation (mod p). Mth. Comp. 32(143), 918–924 (1978)

    MATH  MathSciNet  Google Scholar 

  4. Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Manuscript, available at http://theory.lcs.mit.edu/~rivest/RivestShamirWagner-timelock.ps

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mao, W. (2000). Time-Lock Puzzle with Examinable Evidence of Unlocking Time. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 1999. Lecture Notes in Computer Science, vol 1796. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10720107_14

Download citation

  • DOI: https://doi.org/10.1007/10720107_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67381-1

  • Online ISBN: 978-3-540-45570-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics