Authors
Konstantinos Chalkias, Foteini Baldimtsi, Dimitrios Hristu-Varsakelis, George Stephanides
Publication date
2008
Journal
Bulletin of the Transilvania University of Brasov
Volume
15
Issue
50
Pages
1-4
Description
There are nowdays various e-business applications, such as sealedbid auctions and electronic voting, that require time-delayed decryption of encrypted data. The literature offers at least three main categories of protocols that provide such timed-release encryption (TRE). They rely either on forcing the recipient of a message to solve some time-consuming, non-paralellizable problem before being able to decrypt, or on the use of a trusted entity responsible for providing a piece of information which is necessary for decryption. This article discusses the mathematical background required for implementing TRE methods including factorization, quadratic residues and the bilinear Diffie-Hellman problems, along with a sample protocol for each of the approaches studied here.
Total citations
2010201120122013201420152016201711211
Scholar articles
K Chalkias, F Baldimtsi, D Hristu-Varsakelis… - Bulletin of the Transilvania University of Brasov, 2008
K Chalkias, F Baldimtsi, D Hristu-Varsakelis… - Bulletin of the Transilvania University of Brasov. Series …, 2009