Sok: Delay-based cryptography

L Medley, AF Loe, EA Quaglia - 2023 IEEE 36th Computer …, 2023 - ieeexplore.ieee.org
In this work, we provide a systematisation of knowledge of delay-based cryptography, in
which we discuss and compare the existing primitives within cryptography that utilise a time …

Universally composable simultaneous broadcast against a dishonest majority and applications

M Arapinis, Á Kocsis, N Lamprou, L Medley… - Proceedings of the …, 2023 - dl.acm.org
Simultaneous broadcast (SBC) protocols, introduced in [Chor et al., FOCS 1985], constitute
a special class of broadcast channels which, besides consistency, guarantee that all …

Composing timed cryptographic protocols: Foundations and applications

K Eldefrawy, B Terner, M Yung - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. Unfortunately …

Completeness theorems for adaptively secure broadcast

R Cohen, J Garay, V Zikas - Annual International Cryptology Conference, 2023 - Springer
The advent of blockchain protocols has reignited the interest in adaptively secure broadcast;
it is by now well understood that broadcasting over a diffusion network allows an adaptive …

ChronoCloak: An Integrated Solution for Mitigating Premature Disclosure in Oblivious Digital Dissemination

A Zawia, MA Hasan - International Conference on Information Security, 2024 - Springer
With the increasing use of online digital content delivery, such as games, videos, and
magazine articles, there are scenarios where it is crucial to prevent premature revelation of …

Challenges in Timed Cryptography: A Position Paper

K Eldefrawy, B Terner, M Yung - Cryptology ePrint Archive, 2024 - eprint.iacr.org
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. This topic, while …

Send Message to the Future? Blockchain-based Time Machines for Decentralized Reveal of Locked Information

Z Li, S Majumdar, E Pournaras - arxiv preprint arxiv:2401.05947, 2024 - arxiv.org
Conditional information reveal systems automate the release of information upon meeting
specific predefined conditions, such as time or location. This paper introduces a …

Standard model time-lock puzzles: Defining security and constructing via composition

K Eldefrawy, S Jakkamsetti, B Terner… - Cryptology ePrint …, 2023 - eprint.iacr.org
The introduction of time-lock puzzles initiated the study of publicly “sending information into
the future.” For time-lock puzzles, the underlying security-enabling mechanism is the …

Challenges in Timed-Cryptography: A Position Paper (Short Paper)

K Eldefrawy, B Terner, M Yung - International Symposium on Cyber …, 2024 - Springer
Time-lock puzzles are unique cryptographic primitives that use computational complexity to
keep information secret for some period of time, after which security expires. This topic in …

E-cclesia: Universally composable self-tallying elections

M Arapinis, N Lamprou, L Mareková… - Cryptology ePrint …, 2020 - eprint.iacr.org
The technological advancements of the digital era paved the way for the facilitation of
electronic voting (e-voting) in the promise of efficiency and enhanced security. In standard e …