Afficher la notice abrégée

hal.structure.identifierLithe and fast algorithmic number theory [LFANT]
hal.structure.identifierCentre National de la Recherche Scientifique [CNRS]
hal.structure.identifierAnalyse cryptographique et arithmétique [CANARI]
dc.contributor.authorWESOLOWSKI, Benjamin
dc.date.accessioned2024-04-04T02:45:05Z
dc.date.available2024-04-04T02:45:05Z
dc.identifier.urihttps://oskar-bordeaux.fr/handle/20.500.12278/191437
dc.description.abstractEnThis note was written in 2016. Rejected from PKC 2017, some of the ideas herein later developed into the Eurocrypt 2019 article Efficient verifiable delay functions. Other ideas, such as the construction of fading signatures, and a discussion on their (in)feasibility, never appeared in public work. In light of the recent development of time-sensitive cryptography, some of this content may have become of interest. The reader may notice that the notion of proof of time or knowledge essentially coincides with what is now known as a (trapdoor) verifiable delay function.This paper introduces proofs of time or knowledge, a new primitive in the field of time-sensitive cryptography pioneered by Rivest, Shamir and Wagner in 1996. A party, Alice, has a pair of secret and public keys. Given a piece of data m, a proof of time or knowledge allows to generate a proof p such that anyone can easily verify that either p has been generated by Alice (i.e., she used her secret key), or the party who computed p spent a prescribed amount ∆ of wall-clock time to compute p from m. Suppose that a party, Bob, knows that the message m was not known by Alice before a point in time t0. Then, Bob can infer that Alice computed the proof p if, and only if, the point in time t0 + ∆ has not been reached yet (in this case, (m, p) has the same value as a signature of Alice on m). After point in time t0 + ∆ (or if no bound t0 is known), the pair (m, p) is an indistinguishable proof of time or knowledge, since anyone could have produced it.
dc.language.isoen
dc.title.enA proof of time or knowledge
dc.typeDocument de travail - Pré-publication
dc.subject.halInformatique [cs]/Cryptographie et sécurité [cs.CR]
bordeaux.hal.laboratoriesInstitut de Mathématiques de Bordeaux (IMB) - UMR 5251*
bordeaux.institutionUniversité de Bordeaux
bordeaux.institutionBordeaux INP
bordeaux.institutionCNRS
hal.identifierhal-03380471
hal.version1
hal.origin.linkhttps://hal.archives-ouvertes.fr//hal-03380471v1
bordeaux.COinSctx_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.au=WESOLOWSKI,%20Benjamin&rft.genre=preprint


Fichier(s) constituant ce document

FichiersTailleFormatVue

Il n'y a pas de fichiers associés à ce document.

Ce document figure dans la(les) collection(s) suivante(s)

Afficher la notice abrégée