File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Timed-release encryption revisited

TitleTimed-release encryption revisited
Authors
KeywordsRelease-time confidentiality
Timed-release encryption
Issue Date2008
PublisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/
Citation
The 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51 How to Cite?
AbstractTimed-release encryption (TRE) is a two-factor encryption scheme combining public key encryption and time-dependent encryption - decryption requires a trapdoor which is kept confidential by a time-server until at an appointed time. This paper revisits two recent results. In ESORICS 2007, Chalkias et al. proposed an efficient anonymous TRE scheme. Unfortunately, we show the security threats of their scheme in the presence of a curious time-server and an impatient recipient. Recently, Chow et al. proposed an encryption scheme in the standard model which can be used as TRE. Nevertheless, only confidentiality is guaranteed. We demonstrate how to support pre-open capability, which is often desirable in applications of TRE. Our extension also enables only the recipient to know the release-time from the ciphertext. This feature is not considered in previous notion of release-time confidentiality. © 2008 Springer Berlin Heidelberg.
DescriptionLNCS v. 5324 is conference proceedings of ProvSec 2008
Persistent Identifierhttp://hdl.handle.net/10722/129575
ISSN
2020 SCImago Journal Rankings: 0.249
References

 

DC FieldValueLanguage
dc.contributor.authorChow, SSMen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-12-23T08:39:24Z-
dc.date.available2010-12-23T08:39:24Z-
dc.date.issued2008en_HK
dc.identifier.citationThe 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51en_HK
dc.identifier.issn0302-9743en_HK
dc.identifier.urihttp://hdl.handle.net/10722/129575-
dc.descriptionLNCS v. 5324 is conference proceedings of ProvSec 2008-
dc.description.abstractTimed-release encryption (TRE) is a two-factor encryption scheme combining public key encryption and time-dependent encryption - decryption requires a trapdoor which is kept confidential by a time-server until at an appointed time. This paper revisits two recent results. In ESORICS 2007, Chalkias et al. proposed an efficient anonymous TRE scheme. Unfortunately, we show the security threats of their scheme in the presence of a curious time-server and an impatient recipient. Recently, Chow et al. proposed an encryption scheme in the standard model which can be used as TRE. Nevertheless, only confidentiality is guaranteed. We demonstrate how to support pre-open capability, which is often desirable in applications of TRE. Our extension also enables only the recipient to know the release-time from the ciphertext. This feature is not considered in previous notion of release-time confidentiality. © 2008 Springer Berlin Heidelberg.en_HK
dc.languageengen_US
dc.publisherSpringer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/en_HK
dc.relation.ispartofLecture Notes in Computer Scienceen_HK
dc.rightsThe original publication is available at www.springerlink.com-
dc.subjectRelease-time confidentialityen_HK
dc.subjectTimed-release encryptionen_HK
dc.titleTimed-release encryption revisiteden_HK
dc.typeConference_Paperen_HK
dc.identifier.openurlhttp://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0302-9743&volume=5324&spage=38&epage=51&date=2008&atitle=Timed-release+encryption+revisited-
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-540-88733-1-3en_HK
dc.identifier.scopuseid_2-s2.0-57049171399en_HK
dc.identifier.hkuros177383en_US
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-57049171399&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume5324 LNCSen_HK
dc.identifier.spage38en_HK
dc.identifier.epage51en_HK
dc.publisher.placeGermanyen_HK
dc.description.otherThe 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51-
dc.identifier.scopusauthoridChow, SSM=8980575500en_HK
dc.identifier.scopusauthoridYiu, SM=7003282240en_HK
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats