Certification of Public Keys within an Identity Based System
ISC '02 Proceedings of the 5th International Conference on Information Security
Role-Based Access Control
Time-lock Puzzles and Timed-release Crypto
Time-lock Puzzles and Timed-release Crypto
Information Technology Control and Audit, Second Edition
Information Technology Control and Audit, Second Edition
What can identity-based cryptography offer to web services?
Proceedings of the 2007 ACM workshop on Secure web services
Provably Secure Timed-Release Public Key Encryption
ACM Transactions on Information and System Security (TISSEC)
Designing a secure e-tender submission protocol
Electronic Commerce Research
A tree-covering problem arising in integrity of tree-structured data
Information Processing Letters
Oblivious transfer with timed-release receiver's privacy
Journal of Systems and Software
Provision of trusted identity management using trust credentials
iTrust'06 Proceedings of the 4th international conference on Trust Management
Designing secure e-tendering systems
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Hierarchical identity based encryption with constant size ciphertext
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Time-based release of confidential information in hierarchical settings
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient and non-interactive timed-release encryption
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Timed-release and key-insulated public key encryption
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Timed release cryptography from bilinear pairings using hash chains
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Improved anonymous timed-release encryption
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
Time capsule signature: efficient and provably secure constructions
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Hi-index | 0.00 |
Digital information is increasingly more and more important to enable interactions and transactions on the Internet. On the other hand, leakages of sensitive information can have harmful effects for people, enterprises and governments.This paper focuses on the problems of dealing with timed release of confidential information and simplifying its access once public: it is a common issue in the industry, government and day-to-day life.We introduce the "HP Time Vault Service", based on the emerging Identifier-based Encryption (IBE) cryptography schema. IBE (public) encryption keys specify the disclosure time. These keys are used to encrypt confidential information. An independent time server generates and publishes IBE decryption keys correspondent to the current time, at predefined intervals.We discuss the advantages of this approach against current approaches based on traditional cryptography. A web-service based prototype is described, as a proof of concept.