Time-Lock Puzzle with Examinable Evidence of Unlocking Time
نویسنده
چکیده
Good afternoon. I’ll be sticking to the auditability theme. This is about a protocol which was proposed by Rivest, Shamir and Wagner. It’s a timelock puzzle and to start with I will look at what is a timelock puzzle and what is its use, and then look at the RSW scheme, and then it will be an obvious requirement for auditability, to establish that the puzzle can really be solved within the stated time. Before going into details I look at what the puzzle actually is. It is timedrelease cryptography, which takes a very long time, or any specifiable length of time, to solve. Once it’s solved you then know some bits of crypto. It is based on RSA, and now there is argument about how to name RSA, somebody says it’s the alleged trademark of the cryptography used, so somebody else says it’s secret order, like discrete logarithm, address the problem rather than the inventor’s name. Now the applications of time-release cryptography. Obviously there are several, say a bidder wants to seal a bid for a bidding period, another thing is sending messages to the future, a secret to be read in 50 years’ time, and another thing is key escrow architecture. Key escrow is this thing where there is a requirement to escrow some keys so that they can be recovered, and the danger is vast scale intrusion. So with timed-release cryptography it will take some time to produce a key, although we mustn’t waste a tremendous amount of time, but vast scale penetration becomes infeasible, becomes an individual criminal does not have the resources, so this is an example of a real application. Now look at the RSW scheme. It is based on a secret order to an element. Suppose Alice has a secret to encrypt with a timelock puzzle for t units of time to solve. She generates two big primes p, q and multiplies them to obtain n, and then picks a random session key K and encrypts with this the message M using conventional key cryptography to get CM . Then she encrypts the session key K using RSA, by adding a modulo n to give CK . Here a is a random element and this exponent e is defined as 2 mod φ(n) where t is the number of timesteps needed to solve the puzzle. Since Alice generated p and q she can compute this e easily, whereas without knowing the factorization you cannot compute φ(n). Now CM and a and CK are published, so this triple becomes the timelock puzzle. So if we analyse it we know that to decrypt messageM from CM you need obviously the correct key, assume this, and to decrypt K from CK you need to compute a mod n. Without knowing the factorization of n it seems that the only known way to compute a is by a repeated squaring of a, so that is t multiplications.
منابع مشابه
Time-Lock Puzzles in the Random Oracle Model
A time-lock puzzle is a mechanism for sending messages “to the future”. The sender publishes a puzzle whose solution is the message to be sent, thus hiding it until enough time has elapsed for the puzzle to be solved. For timelock puzzles to be useful, generating a puzzle should take less time than solving it. Since adversaries may have access to many more computers than honest solvers, massive...
متن کاملTime-lock puzzles
A time-lock puzzle is merely an encryption scheme that has no secret key. The secret key in an encryption scheme is intended to allow efficient decryption only for the holder of the key. If the sender wishes the receiver to be the only receiver of the message, he or she should use a secure encryption scheme on top of the time-lock puzzle. In a time-lock puzzle, “efficient” decryption (in a cert...
متن کاملSend Message into a Definite Future
Rivest et al proposed a time-lock puzzle scheme for encrypting messages which can only be decrypted in the future. Such a puzzle speci es an algorithm for decrypting the message locked in and the speci ed algorithm has a well understood time complexity. However, that time-lock puzzle scheme does not provide a means for one to examine whether a puzzle has been formed in good order. Consequently,...
متن کاملIt's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception
A lot of research is being conducted into improving the us-ability and security of phone-unlocking. There is howevera severe lack of scientific data on users’ current unlockingbehavior and perceptions. We performed an online survey(n = 260) and a one-month field study (n = 52) to gaininsights into real world (un)locking behavior of smartphoneusers. One of the main goals ...
متن کاملIntroducing an Invention: Puzzle Shaped Cast for Upper Limb Fractures
Upper limb fractures are prevalent injuries. An essential element of fracture healing is to maintain the bones alignment. However there are lots of complications associated with traditional ways of treatment, such as compartment syndrome and stiffness due to immobility for long time. Also evaluation and observation of the limb under the casts for potential infections and skin issues are n...
متن کامل