Entry Cheon:2008:PST from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Cheon:2008:PST,
  author =       "Jung Hee Cheon and Nicholas Hopper and Yongdae Kim and
                 Ivan Osipkov",
  title =        "Provably {Secure Timed-Release Public Key
                 Encryption}",
  journal =      j-TISSEC,
  volume =       "11",
  number =       "2",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1330332.1330336",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Thu Jun 12 17:52:41 MDT 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "A timed-release cryptosystem allows a sender to
                 encrypt a message so that only the intended recipient
                 can read it only after a specified time. We formalize
                 the concept of a secure timed-release public-key
                 cryptosystem and show that, if a third party is relied
                 upon to guarantee decryption after the specified date,
                 this concept is equivalent to identity-based
                 encryption; this explains the observation that all
                 known constructions use identity-based encryption to
                 achieve timed-release security. We then give several
                 provably-secure constructions of timed-release
                 encryption: a generic scheme based on any
                 identity-based encryption scheme, and two more
                 efficient schemes based on the existence of
                 cryptographically admissible bilinear mappings. The
                 first of these is essentially as efficient as the
                 Boneh--Franklin Identity-Based encryption scheme, and
                 is provably secure and authenticated in the random
                 oracle model; the final scheme is not authenticated but
                 is provably secure in the standard model (i. e. ,
                 without random oracles).",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "authenticated encryption; key-insulated encryption;
                 timed-release",
}

Related entries