DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cheon, JH | ko |
dc.contributor.author | Hopper, N | ko |
dc.contributor.author | Kim, Yongdae | ko |
dc.contributor.author | Osipkov, I | ko |
dc.date.accessioned | 2013-03-08T14:21:24Z | - |
dc.date.available | 2013-03-08T14:21:24Z | - |
dc.date.created | 2012-11-01 | - |
dc.date.created | 2012-11-01 | - |
dc.date.issued | 2008-03 | - |
dc.identifier.citation | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, v.11, no.2 | - |
dc.identifier.issn | 1094-9224 | - |
dc.identifier.uri | http://hdl.handle.net/10203/93245 | - |
dc.description.abstract | A timed- release cryptosystem allows a sender to encrypt a message so that only the intended recipient can read it only after a specified time. We formalize the concept of a secure timed- release public- key cryptosystem and show that, if a third party is relied upon to guarantee decryption after the specified date, this concept is equivalent to identity- based encryption; this explains the observation that all known constructions use identity- based encryption to achieve timed- release security. We then give several provably- secure constructions of timed- release encryption: a generic scheme based on any identity- based encryption scheme, and two more efficient schemes based on the existence of cryptographically admissible bilinear mappings. The first of these is essentially as efficient as the Boneh- Franklin Identity- Based encryption scheme, and is provably secure and authenticated in the random oracle model; the final scheme is not authenticated but is provably secure in the standard model ( i. e., without random oracles). | - |
dc.language | English | - |
dc.publisher | ASSOC COMPUTING MACHINERY | - |
dc.title | Provably secure timed-release public key encryption | - |
dc.type | Article | - |
dc.identifier.wosid | 000255193000004 | - |
dc.identifier.scopusid | 2-s2.0-40049107631 | - |
dc.type.rims | ART | - |
dc.citation.volume | 11 | - |
dc.citation.issue | 2 | - |
dc.citation.publicationname | ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY | - |
dc.identifier.doi | 10.1145/1330332.1330336 | - |
dc.contributor.localauthor | Kim, Yongdae | - |
dc.contributor.nonIdAuthor | Cheon, JH | - |
dc.contributor.nonIdAuthor | Hopper, N | - |
dc.contributor.nonIdAuthor | Osipkov, I | - |
dc.type.journalArticle | Article | - |
dc.subject.keywordAuthor | timed-release | - |
dc.subject.keywordAuthor | authenticated encryption | - |
dc.subject.keywordAuthor | key-insulated encryption | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.