Timed-Release Public Key Based Authenticated Encryption
نویسندگان
چکیده
In this paper, we formally define a notion of timed-release public key based authenticated encryption (TR-PKAE). In addition to standard time-independent security properties (such as IND-CCA security for confidentiality and ciphertext/plaintext unforgeability), TR-PKAE introduces requirements such as timed-release receiver confidentiality (IND-RTR-CCA), which precludes the receiver from decrypting ciphertext before designated time, and ciphertext/plaintext unforgeability by the receiver itself for a future designated time among others. We propose a first provably secure TR-PKAE construction based on bilinear maps and prove the above security requirements in the random oracle model. Even though our protocol does not use digital signatures, receiver can still prove to a third party the message origin. The proposed protocol is compact, practical and efficient.
منابع مشابه
Authenticated Key-Insulated Public Key Encryption and Timed-Release Cryptography
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release cryptography, and show that, despite several differences in its formulation...
متن کاملTimed-Release and Key-Insulated Public Key Encryption
In this paper we consider two security notions related to Identity Based Encryption: Key-insulated public key encryption, introduced by Dodis, Katz, Xu and Yung; and Timed-Release Public Key cryptography, introduced independently by May and Rivest, Shamir and Wagner. We first formalize the notion of secure timed-release public key encryption, and show that, despite several differences in its fo...
متن کاملScalable, Server-Passive, User-Anonymous Timed Release Public Key Encryption from Bilinear Pairing
We consider the problem of sending messages into the future, commonly known as timed release cryptography. Existing schemes for this task either solve the relative time problem with uncontrollable, coarse-grained release time (time-lock puzzle approach) or do not provide anonymity to sender and/or receiver and are not scalable (server-based approach). Using a bilinear paring on any Gap Diffie-H...
متن کاملImproved ID Based Key Agreement Protocol Using Timestamp
ID-based encryption (or identity-based encryption (IBE)) is an important primitive of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user (e.g. a user's email address). This can use the text-value of the name or domain name as a key or the physical IP address it translates to. Authentica...
متن کاملArtemia: a family of provably secure authenticated encryption schemes
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the in...
متن کامل