Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model

被引:6
|
作者
Yuan, Ke [1 ,2 ]
Wang, Yahui [1 ,2 ]
Zeng, Yingming [3 ]
Ouyang, Wenlei [1 ]
Li, Zheng [1 ]
Jia, Chunfu [4 ]
机构
[1] Henan Univ, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
[2] Henan Univ, Int Joint Res Lab Cooperat Vehicular Networks Hen, Kaifeng 475004, Peoples R China
[3] Beijing Inst Comp Technol & Applicat, Beijing 100854, Peoples R China
[4] Nankai Univ, Coll Cybersecur, Tianjin 300350, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
D O I
10.1155/2021/5593363
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptographic primitive of timed-release encryption (TRE) enables the sender to encrypt a message which only allows the designated receiver to decrypt after a designated time. Combined with other encryption technologies, TRE technology is applied to a variety of scenarios, including regularly posting on the social network and online sealed bidding. Nowadays, in order to control the decryption time while maintaining anonymity of user identities, most TRE solutions adopt a noninteractive time server mode to periodically broadcast time trapdoors, but because these time trapdoors are generated with fixed time server's private key, many "ciphertexts" related to the time server's private key that can be cryptanalyzed are generated, which poses a big challenge to the confidentiality of the time server's private key. To work this out, we propose a concrete scheme and a generic scheme of security-enhanced TRE (SETRE) in the random oracle model. In our SETRE schemes, we use fixed and variable random numbers together as the time server's private key to generate the time trapdoors. We formalize the definition of SETRE and give a provably secure concrete construction of SETRE. According to our experiment, the concrete scheme we proposed reduces the computational cost by about 10.8% compared to the most efficient solution in the random oracle model but only increases the almost negligible storage space. Meanwhile, it realizes one-time pad for the time trapdoor. To a large extent, this increases the security of the time server's private key. Therefore, our work enhances the security and efficiency of the TRE.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Provably secure timed-release public key encryption
    Cheon, Jung Hee
    Hopper, Nicholas
    Kim, Yongdae
    Osipkov, Ivan
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 11 (02)
  • [2] Provably Secure Timed-Release Proxy Conditional Reencryption
    Fan, Chun-I
    Chen, Jun-Cheng
    Huang, Shi-Yuan
    Huang, Jheng-Jia
    Chen, Wen-Tsuen
    [J]. IEEE SYSTEMS JOURNAL, 2017, 11 (04): : 2291 - 2302
  • [3] A Versatile Secure Protocol for Anonymous Timed-Release Encryption
    Hristu-Varsakelis, D.
    Chalkias, K.
    Stephanides, G.
    [J]. JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2008, 3 (01): : 80 - 88
  • [4] Flexible Timed-Release Encryption
    Yoshida, Maki
    Fujiwara, Toru
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 222 - 225
  • [5] Revisiting the security model for timed-release encryption with pre-open capability
    Dent, Alexander W.
    Tang, Qiang
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 158 - +
  • [6] Timed-Release Certificateless Encryption
    Oshikiri, Toru
    Saito, Taiichi
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (02) : 278 - 284
  • [7] Global Timed-Release Encryption
    Yoshida, Maki
    Fujiwara, Toru
    [J]. 2008 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2008, : 369 - 370
  • [8] Timed-Release Encryption Revisited
    Chow, Sherman S. M.
    Yiu, S. M.
    [J]. PROVABLE SECURITY, 2008, 5324 : 38 - +
  • [9] General Certificateless Encryption and Timed-Release Encryption
    Chow, Sherman S. M.
    Roth, Volker
    Rieffel, Eleanor G.
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 126 - +
  • [10] On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme
    Wang, Xu An
    Sangaiah, Arun Kumar
    Nedjah, Nadia
    Shan, Chun
    Wang, Zuliang
    [J]. ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 192 - 198