Provably secure timed-release public key encryption

Cited 37 time in webofscience Cited 0 time in scopus
  • Hit : 882
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorCheon, JHko
dc.contributor.authorHopper, Nko
dc.contributor.authorKim, Yongdaeko
dc.contributor.authorOsipkov, Iko
dc.date.accessioned2013-03-08T14:21:24Z-
dc.date.available2013-03-08T14:21:24Z-
dc.date.created2012-11-01-
dc.date.created2012-11-01-
dc.date.issued2008-03-
dc.identifier.citationACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2-
dc.identifier.issn1094-9224-
dc.identifier.urihttp://hdl.handle.net/10203/93245-
dc.description.abstractA timed- release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it only after a specified time. We formalize the concept of a secure timed- release public- key cryptosystem and show that, if a third party is relied upon to guarantee decryption after the specified date, this concept is equivalent to identity- based encryption; this explains the observation that all known constructions use identity- based encryption to achieve timed- release security. We then give several provably- secure constructions of timed- release encryption: a generic scheme based on any identity- based encryption scheme, and two more efficient schemes based on the existence of cryptographically admissible bilinear mappings. The first of these is essentially as efficient as the Boneh- Franklin Identity- Based encryption scheme, and is provably secure and authenticated in the random oracle model; the final scheme is not authenticated but is provably secure in the standard model ( i. e., without random oracles).-
dc.languageEnglish-
dc.publisherASSOC COMPUTING MACHINERY-
dc.titleProvably secure timed-release public key encryption-
dc.typeArticle-
dc.identifier.wosid000255193000004-
dc.identifier.scopusid2-s2.0-40049107631-
dc.type.rimsART-
dc.citation.volume11-
dc.citation.issue2-
dc.citation.publicationnameACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY-
dc.identifier.doi10.1145/1330332.1330336-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorCheon, JH-
dc.contributor.nonIdAuthorHopper, N-
dc.contributor.nonIdAuthorOsipkov, I-
dc.type.journalArticleArticle-
dc.subject.keywordAuthortimed-release-
dc.subject.keywordAuthorauthenticated encryption-
dc.subject.keywordAuthorkey-insulated encryption-
Appears in Collection
EE-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 37 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0