File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-540-88733-1-3
- Scopus: eid_2-s2.0-57049171399
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Timed-release encryption revisited
Title | Timed-release encryption revisited |
---|---|
Authors | |
Keywords | Release-time confidentiality Timed-release encryption |
Issue Date | 2008 |
Publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ |
Citation | The 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51 How to Cite? |
Abstract | Timed-release encryption (TRE) is a two-factor encryption scheme combining public key encryption and time-dependent encryption - decryption requires a trapdoor which is kept confidential by a time-server until at an appointed time. This paper revisits two recent results. In ESORICS 2007, Chalkias et al. proposed an efficient anonymous TRE scheme. Unfortunately, we show the security threats of their scheme in the presence of a curious time-server and an impatient recipient. Recently, Chow et al. proposed an encryption scheme in the standard model which can be used as TRE. Nevertheless, only confidentiality is guaranteed. We demonstrate how to support pre-open capability, which is often desirable in applications of TRE. Our extension also enables only the recipient to know the release-time from the ciphertext. This feature is not considered in previous notion of release-time confidentiality. © 2008 Springer Berlin Heidelberg. |
Description | LNCS v. 5324 is conference proceedings of ProvSec 2008 |
Persistent Identifier | http://hdl.handle.net/10722/129575 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chow, SSM | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-12-23T08:39:24Z | - |
dc.date.available | 2010-12-23T08:39:24Z | - |
dc.date.issued | 2008 | en_HK |
dc.identifier.citation | The 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51 | en_HK |
dc.identifier.issn | 0302-9743 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/129575 | - |
dc.description | LNCS v. 5324 is conference proceedings of ProvSec 2008 | - |
dc.description.abstract | Timed-release encryption (TRE) is a two-factor encryption scheme combining public key encryption and time-dependent encryption - decryption requires a trapdoor which is kept confidential by a time-server until at an appointed time. This paper revisits two recent results. In ESORICS 2007, Chalkias et al. proposed an efficient anonymous TRE scheme. Unfortunately, we show the security threats of their scheme in the presence of a curious time-server and an impatient recipient. Recently, Chow et al. proposed an encryption scheme in the standard model which can be used as TRE. Nevertheless, only confidentiality is guaranteed. We demonstrate how to support pre-open capability, which is often desirable in applications of TRE. Our extension also enables only the recipient to know the release-time from the ciphertext. This feature is not considered in previous notion of release-time confidentiality. © 2008 Springer Berlin Heidelberg. | en_HK |
dc.language | eng | en_US |
dc.publisher | Springer Verlag. The Journal's web site is located at http://springerlink.com/content/105633/ | en_HK |
dc.relation.ispartof | Lecture Notes in Computer Science | en_HK |
dc.rights | The original publication is available at www.springerlink.com | - |
dc.subject | Release-time confidentiality | en_HK |
dc.subject | Timed-release encryption | en_HK |
dc.title | Timed-release encryption revisited | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.openurl | http://library.hku.hk:4550/resserv?sid=HKU:IR&issn=0302-9743&volume=5324&spage=38&epage=51&date=2008&atitle=Timed-release+encryption+revisited | - |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-540-88733-1-3 | en_HK |
dc.identifier.scopus | eid_2-s2.0-57049171399 | en_HK |
dc.identifier.hkuros | 177383 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-57049171399&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | 5324 LNCS | en_HK |
dc.identifier.spage | 38 | en_HK |
dc.identifier.epage | 51 | en_HK |
dc.publisher.place | Germany | en_HK |
dc.description.other | The 2nd Provable Security International Conference (ProvSec 2008), Shanghai, China, 30 October-1 November 2008. In Lecture Notes in Computer Science, 2008, v. 5324, p. 38-51 | - |
dc.identifier.scopusauthorid | Chow, SSM=8980575500 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |
dc.identifier.issnl | 0302-9743 | - |