Abstract
We revisit the problem of “sending information into the future” by proposing an anonymous, non-interactive, server-based Timed-Release Encryption (TRE) protocol. We improve upon recent approaches by Blake and Chan, Hwang et al., and Cathalo et al., by reducing the number of bilinear pairings that users must compute, and by enabling additional pre-computations. Our solution compares favorably with existing schemes in terms of computational efficiency, communication cost and memory requirements, and is secure in the random oracle model.
Chapter PDF
Similar content being viewed by others
References
Bellare, M., Goldwasser, S.: Encapsulated Key Escrow. MIT Laboratory for Computer Science Technical Report 688 (1996)
Bellare, M., Rogaway, P.: Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols. In: 1st ACM Conf. on Computer and Communications Security, pp. 62–73. ACM Press, New York (1993)
Blake, I.F., Chan, A.C.-F.: Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. In: 25th IEEE Intl. Conf. on Distributed Computing Systems, pp. 504–513. IEEE Computer Society Press, Los Alamitos (2005)
Boneh, D., Boyen, X.: Short Signatures Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 56–73. Springer, Heidelberg (2004)
Boneh, D., Boyen, X.: Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223–238. Springer, Heidelberg (2004)
Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext (2005), available at http://eprint.iacr.org/2005/015
Boneh, D., Franklin, M.: Identity Based Encryption From the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boneh, D., Naor, M.: Timed Commitments and Applications. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236–254. Springer, Heidelberg (2000)
Canetti, R., Halevi, S., Katz, J.: A Forward Secure Public Key Encryption Scheme. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 254–271. Springer, Heidelberg (2003)
Cathalo, J., Libert, B., Quisquater, J.-J.: Efficient and Non-interactive Timed-Release Encryption. In: Qing, S., Mao, W., Lopez, J., Wang, G. (eds.) ICICS 2005. LNCS, vol. 3783, pp. 291–303. Springer, Heidelberg (2005)
Cathalo, J., Libert, B., Quisquater, J.-J.: Unpublished Extended version of [10], personal communication
Chalkias, K., Hristu-Varsakelis, D., Stephanides, G.: A Protocol for Improved Timed-Release Encryption. Technical Report, Computational Systems and Software Engineering Laboratory, Department of Applied Informatics, University of Macedonia (2007), available at: http://csse.uom.gr/eprints/58/01/AnTRE-full.pdf
Chalkias, K., Stephanides, G.: Timed Release Cryptography from Bilinear Pairings Using Hash Chains. In: Leitold, H., Markatos, E. (eds.) CMS 2006. LNCS, vol. 4237, pp. 130–140. Springer, Heidelberg (2006)
Damgard, I.: Practical and probably secure release of a secret and exchange of signatures. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 200–217. Springer, Heidelberg (1994)
Dent, A.W., Tang, Q.: Revisiting the Security Model for Timed-Release Public-Key Encryption with Pre-Open Capability (2006), available at http://eprint.iacr.org/2006/306.pdf
Crescenzo, G.D., Ostrovsky, R., Rajagopalan, S.: Conditional Oblivious Transfer and Timed-Release Encryption. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 74–89. Springer, Heidelberg (1999)
Fujisaki, E., Okamoto, T.: How to Enhance the Security of Public-Key Encryption at Minimum Cost. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 53–68. Springer, Heidelberg (1999)
Garay, J., Jakobsson, M.: Timed Release of Standard Digital Signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 168–182. Springer, Heidelberg (2003)
Garay, J., Pomerance, C.: Timed Fair Exchange of Standard Signatures. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 190–207. Springer, Heidelberg (2003)
Hwang, Y.H., Yum, D.H., Lee, P.J.: Timed-Release Encryption with Pre-open Capability and its Application to Certified E-mail System. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 344–358. Springer, Heidelberg (2005)
Joux, A.: The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems (Survey). In: Fieker, C., Kohel, D.R. (eds.) Algorithmic Number Theory. LNCS, vol. 2369, pp. 20–32. Springer, Heidelberg (2002)
May, T.: Timed-Release Crypto, manuscript (1993), available at http://www.hks.net/cpunks/cpunks-0/1560.html
Ltd, S.S.: Miracl - Multiprecision Integer and Rational Arithmetic C/C++ Library (See: http://indigo.ie/mscott/ )
Mao, W.: Timed Release Cryptography. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 342–357. Springer, Heidelberg (2001)
Mont, M.C., Harrison, K., Sadler, M.: The HP time vault service: Innovating the way confidential information is disclosed at the right time. In: 12th Intl. World Wide Web Conf., pp. 160–169. ACM Press, New York (2003)
Osipkov, I., Kim, Y., Cheon, J.-H.: Timed-Release Public Key Based Authenticated Encryption (2004), available at http://eprint.iacr.org/2004/231
Rivest, R.L., Shamir, A., Wagner, D.A.: Time-Lock Puzzles and Timed-Release Crypto. MIT Laboratory for Computer Science Technical Report 684 (1996)
Stogbauer, M.: Efficient Algorithms for Pairing-Based Cryptosystems. Diploma Thesis: Darmstadt University of Technology, Dept. of Mathematics (2004)
Syverson, P.F.: Weakly Secret Bit Commitment: Applications to Lotteries and Fair Exchange. In: 11th IEEE Computer Security Foundations Workshop, pp. 2–13. IEEE Computer Society Press, Los Alamitos (1998)
Zhang, F., Safavi-Naini, R., Susilo, W.: An Efficient Signature Scheme from Bilinear Pairings and Its Applications. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 277–290. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chalkias, K., Hristu-Varsakelis, D., Stephanides, G. (2007). Improved Anonymous Timed-Release Encryption. In: Biskup, J., López, J. (eds) Computer Security – ESORICS 2007. ESORICS 2007. Lecture Notes in Computer Science, vol 4734. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74835-9_21
Download citation
DOI: https://doi.org/10.1007/978-3-540-74835-9_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74834-2
Online ISBN: 978-3-540-74835-9
eBook Packages: Computer ScienceComputer Science (R0)