Mathematical problems and algorithms for timed − release encryption

Authors

  • K. Chalkias University of Macedonia, Thessaloniki, Greece
  • F. Baldimtsi University of Macedonia, Thessaloniki, Greece
  • D. Hristu-Varsakelis University of Macedonia, Thessaloniki, Greece
  • G. Stephanides University of Macedonia, Thessaloniki, Greece

Abstract

There are nowadays various e-business applications, such as sealed-bid auctions and electronic voting, that require time-delayed decryption of encrypted data. The literature offers at least three main categories of protocols that provide such timed-release encryption (TRE). They rely either on forcing the recipient of a message to solve some time-consuming, non-parallelizable problem before being able to decrypt or on the use of a trusted entity responsible for providing a piece of information that is necessary for decryption. This article discusses the mathematical background required for implementing TRE methods including factorization, quadratic residues, and the bilinear Diffie-Hellman problems, along with a sample protocol for each of the approaches studied here.

Author Biographies

K. Chalkias, University of Macedonia, Thessaloniki, Greece

Computational Systems and Software Engineering Laboratory, Dept. of Applied Informatics 

F. Baldimtsi, University of Macedonia, Thessaloniki, Greece

Computational Systems and Software Engineering Laboratory, Dept. of Applied Informatics 

D. Hristu-Varsakelis, University of Macedonia, Thessaloniki, Greece

Computational Systems and Software Engineering Laboratory, Dept. of Applied Informatics

G. Stephanides, University of Macedonia, Thessaloniki, Greece

Computational Systems and Software Engineering Laboratory, Dept. of Applied Informatics

Downloads

Published

2009-12-15

Issue

Section

MATHEMATICS, INFORMATICS, PHYSICS