skip to main content
10.1145/3548606.3560704acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?

Published: 07 November 2022 Publication History

Abstract

Timed-release encryption can encrypt a message to a future time such that it can only be decrypted after that time. Potential applications include sealed bid auctions, scheduled confidential transactions, and digital time capsules. To enable such applications as decentralized smart contracts, we explore how to use timed-release encryption on blockchains.
Practical constructions in the literature rely on a trusted server (or servers in a threshold setting), which periodically publishes an epoch-specific decryption key based on a long-term secret. Their main idea is to model time periods or epochs as identities in an identity-based encryption scheme. However, these schemes suffer from a fatal flaw: an epoch's key does not let us decrypt ciphertexts locked to prior epochs. Paterson and Quaglia [SCN'10] address this concern by having encryption specify a range of epochs when decryption is allowed. However, we are left with an efficiency concern: in each epoch, the server(s) must publish (via a smart contract transaction) a decryption key of size logarithmic in the lifetime (total number of epochs). For instance, on Ethereum, for a modest lifetime spanning 2 years of 1-minute long epochs, a server must spend over \6 in gas fees, every minute; this cost multiplies with the number of servers in a threshold setting.
We propose a novel timed-release encryption scheme, where a decryption key, while logarithmic in size, allows incremental updates, wherein a short update key (single group element) is sufficient to compute the successive decryption key; our decryption key lets the client decrypt ciphertexts locked to any prior epoch. This leads to significant reduction is gas fees, for instance, only \0.30 in the above setting. Moreover, ciphertexts are also compact (logarithmic in the total lifetime), and encryption and decryption are on the order of few milliseconds. Furthermore, we decentralize the trust among a number of servers, so as to tolerate up to a threshold number of (malicious) corruptions.
Our construction is based on bilinear pairing, and adapts ideas from Canetti et al.'s binary tree encryption [Eurocypt 2003] and Naor et al.'s distributed pseudorandom functions [Eurocrypt 1999].

References

[1]
[n.d.]. Now Released (Fall 2010): Autobiography of Mark Twain, Volume 1. https://www.marktwainproject.org/about_absample.shtml.
[2]
Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, and Peter Rindal. 2018. DiSE: Distributed Symmetric-key Encryption. In ACM CCS 2018, David Lie, Mohammad Mannan, Michael Backes, and XiaoFeng Wang (Eds.). ACM Press, 1993--2010. https://doi.org/10.1145/3243734.3243774
[3]
Leemon Baird, Pratyay Mukherjee, and Rohit Sinha. 2021. i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains? Cryptology ePrint Archive, Paper 2021/800. https://doi.org/10. 1145/3548606.3560704 https://eprint.iacr.org/2021/800.
[4]
Dan Boneh, Xavier Boyen, and Eu-Jin Goh. 2005. Hierarchical Identity Based Encryption with Constant Size Ciphertext. In EUROCRYPT 2005 (LNCS, Vol. 3494), Ronald Cramer (Ed.). Springer, Heidelberg, 440--456. https://doi.org/10.1007/ 11426639_26
[5]
Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO 2001 (LNCS, Vol. 2139), Joe Kilian (Ed.). Springer, Heidelberg, 213--229. https://doi.org/10.1007/3--540--44647--8_13
[6]
Dan Boneh, Ben Lynn, and Hovav Shacham. 2001. Short Signatures from the Weil Pairing. In ASIACRYPT 2001 (LNCS, Vol. 2248), Colin Boyd (Ed.). Springer, Heidelberg, 514--532. https://doi.org/10.1007/3--540--45682--1_30
[7]
Dan Boneh and Victor Shoup. 2020. A Graduate Course in Applied Cryptography. Manuscript. https://toc.cryptobook.us/.
[8]
Sean Bowe. 2017. BLS12--381: New zk-SNARK elliptic curve construction. https: //electriccoin.co/blog/new-snark-curve/.
[9]
Ran Canetti, Shai Halevi, and Jonathan Katz. 2003. A Forward-Secure PublicKey Encryption Scheme. In EUROCRYPT 2003 (LNCS, Vol. 2656), Eli Biham (Ed.). Springer, Heidelberg, 255--271. https://doi.org/10.1007/3--540--39200--9_16
[10]
Julien Cathalo, Benoît Libert, and Jean-Jacques Quisquater. 2005. Efficient and Non-interactive Timed-Release Encryption. In ICICS 05 (LNCS, Vol. 3783), Sihan Qing, Wenbo Mao, Javier López, and Guilin Wang (Eds.). Springer, Heidelberg, 291--303.
[11]
Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, and George Stephanides. 2007. Improved Anonymous Timed-Release Encryption. In ESORICS 2007 (LNCS, Vol. 4734), Joachim Biskup and Javier López (Eds.). Springer, Heidelberg, 311--326. https://doi.org/10.1007/978--3--540--74835--9_21
[12]
Aldar C. F. Chan and Ian F. Blake. 2005. Scalable, Server-Passive, User-Anonymous Timed Release Cryptography. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS '05). IEEE Computer Society, USA, 504--513. https://doi.org/10.1109/ICDCS.2005.72
[13]
David Chaum and Hans Van Antwerpen. 1990. Undeniable Signatures. In CRYPTO'89 (LNCS, Vol. 435), Gilles Brassard (Ed.). Springer, Heidelberg, 212-- 216. https://doi.org/10.1007/0--387--34805-0_20
[14]
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, and Ivan Osipkov. 2006. TimedRelease and Key-Insulated Public Key Encryption. In FC 2006 (LNCS, Vol. 4107), Giovanni Di Crescenzo and Avi Rubin (Eds.). Springer, Heidelberg, 191--205.
[15]
Jung Hee Cheon, Nicholas Hopper, Yongdae Kim, and Ivan Osipkov. 2008. Provably Secure Timed-Release Public Key Encryption. ACM Trans. Inf. Syst. Secur. 11, 2, Article 4 (May 2008), 44 pages. https://doi.org/10.1145/1330332.1330336
[16]
Gwangbae Choi and Serge Vaudenay. 2019. Timed-Release Encryption With Master Time Bound Key (Extended). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 10, 4 (2019), 88--108. https://doi.org/10.22667/JOWUA.2019.12. 31.088
[17]
Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan. 1999. Conditional Oblivious Transfer and Timed-Release Encryption. In EUROCRYPT'99 (LNCS, Vol. 1592), Jacques Stern (Ed.). Springer, Heidelberg, 74--89. https://doi.org/10.1007/3--540--48910-X_6
[18]
Amos Fiat and Adi Shamir. 1987. How to Prove Yourself: Practical Solutions to Identification and Signature Problems. In CRYPTO'86 (LNCS, Vol. 263), Andrew M. Odlyzko (Ed.). Springer, Heidelberg, 186--194. https://doi.org/10.1007/ 3--540--47721--7_12
[19]
Eiichiro Fujisaki and Tatsuaki Okamoto. 1999. Secure Integration of Asymmetric and Symmetric Encryption Schemes. In CRYPTO'99 (LNCS, Vol. 1666), Michael J. Wiener (Ed.). Springer, Heidelberg, 537--554. https://doi.org/10.1007/ 3--540--48405--1_34
[20]
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, and Tal Rabin. 2007. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. Journal of Cryptology 20, 1 (Jan. 2007), 51--83. https://doi.org/10.1007/s00145-006-0347--3
[21]
Craig Gentry and Alice Silverberg. 2002. Hierarchical ID-Based Cryptography. In ASIACRYPT 2002 (LNCS, Vol. 2501), Yuliang Zheng (Ed.). Springer, Heidelberg, 548--566. https://doi.org/10.1007/3--540--36178--2_34
[22]
Jeremy Horwitz and Ben Lynn. 2002. Toward Hierarchical Identity-Based Encryption. In EUROCRYPT 2002 (LNCS, Vol. 2332), Lars R. Knudsen (Ed.). Springer, Heidelberg, 466--481. https://doi.org/10.1007/3--540--46035--7_31
[23]
Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, and Hideki Imai. 2016. Time-specific encryption from forwardsecure encryption: generic and direct constructions. Int. J. Inf. Sec. 15, 5 (2016), 549--571. https://doi.org/10.1007/s10207-015-0304-y
[24]
Jia Liu, Tibor Jager, Saqib A. Kakvi, and Bogdan Warinschi. 2018. How to Build Time-Lock Encryption. Des. Codes Cryptography 86, 11 (Nov. 2018), 2549--2586. https://doi.org/10.1007/s10623-018-0461-x
[25]
Mohammad Mahmoody, Tal Moran, and Salil P. Vadhan. 2011. Time-Lock Puzzles in the Random Oracle Model. In CRYPTO 2011 (LNCS, Vol. 6841), Phillip Rogaway (Ed.). Springer, Heidelberg, 39--50. https://doi.org/10.1007/978--3--642--22792--9_3
[26]
T.C. May. 2021. Timed-release crypto. http://www.hks.net.cpunks/cpunks-0/ 1460.html.
[27]
Moni Naor, Benny Pinkas, and Omer Reingold. 1999. Distributed Pseudo-random Functions and KDCs. In EUROCRYPT'99 (LNCS, Vol. 1592), Jacques Stern (Ed.). Springer, Heidelberg, 327--346. https://doi.org/10.1007/3--540--48910-X_23
[28]
Shutter Network. 2021. Shutter -- In-Depth Explanation of How We Prevent Front Running. https://blog.shutter.network/ shutter-in-depth-explanation-of-how-we-prevent-frontrunning/.
[29]
Jianting Ning, Hung Dang, Ruomu Hou, and Ee-Chien Chang. 2018. Keeping Time-Release Secrets through Smart Contracts. Cryptology ePrint Archive, Report 2018/1166. https://eprint.iacr.org/2018/1166.
[30]
Kenneth G. Paterson and Elizabeth A. Quaglia. 2010. Time-Specific Encryption. In SCN 10 (LNCS, Vol. 6280), Juan A. Garay and Roberto De Prisco (Eds.). Springer, Heidelberg, 1--16. https://doi.org/10.1007/978--3--642--15317--4_1
[31]
Michael O Rabin and Christopher Thorpe. 2006. Time-lapse cryptography. (2006).
[32]
Ronald L. Rivest, Adi Shamir, and David A. Wagner. 1996. Time-lock puzzles and timed-release crypto. Technical Report.
[33]
Claus-Peter Schnorr. 1990. Efficient Identification and Signatures for Smart Cards. In CRYPTO'89 (LNCS, Vol. 435), Gilles Brassard (Ed.). Springer, Heidelberg, 239--252. https://doi.org/10.1007/0--387--34805-0_22
[34]
Adi Shamir. 1979. How to Share a Secret. Communications of the Association for Computing Machinery 22, 11 (Nov. 1979), 612--613.
[35]
Michael Specter, Sunoo Park, and Matthew Green. 2021. KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures.
[36]
Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32.

Cited By

View all
  • (2025)Fully-incremental Public Key Encryption with Adjustable Timed-Release Keyword SearchInformation Sciences10.1016/j.ins.2025.121887(121887)Online publication date: Jan-2025
  • (2024)A survey on the application of blockchain in cryptographic protocolsCybersecurity10.1186/s42400-024-00324-77:1Online publication date: 27-Dec-2024
  • (2024)Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud systemJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00676-y13:1Online publication date: 12-Jun-2024
  • Show More Cited By

Index Terms

  1. i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
    November 2022
    3598 pages
    ISBN:9781450394505
    DOI:10.1145/3548606
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 November 2022

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. blockchain
    2. identity-based encryption
    3. timed-release encryption

    Qualifiers

    • Research-article

    Conference

    CCS '22
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)114
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 25 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Fully-incremental Public Key Encryption with Adjustable Timed-Release Keyword SearchInformation Sciences10.1016/j.ins.2025.121887(121887)Online publication date: Jan-2025
    • (2024)A survey on the application of blockchain in cryptographic protocolsCybersecurity10.1186/s42400-024-00324-77:1Online publication date: 27-Dec-2024
    • (2024)Multiple time servers timed-release encryption based on Shamir secret sharing for EHR cloud systemJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-024-00676-y13:1Online publication date: 12-Jun-2024
    • (2024)Secret Sharing with SnitchingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690296(840-853)Online publication date: 2-Dec-2024
    • (2024)Beyond Security: Achieving Fairness in Mailmen-Assisted Timed Data DeliveryIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341604919(6425-6440)Online publication date: 2024
    • (2024)PR-TDR: Privacy-Preserving and Reliable Timed Data Release2024 43rd International Symposium on Reliable Distributed Systems (SRDS)10.1109/SRDS64841.2024.00021(115-125)Online publication date: 30-Sep-2024
    • (2024)Timed Data Release Using Smart Contracts2024 IEEE 44th International Conference on Distributed Computing Systems (ICDCS)10.1109/ICDCS60910.2024.00136(1420-1422)Online publication date: 23-Jul-2024
    • (2023)Securing blockchain-based timed data release against adversarial attacksJournal of Computer Security10.3233/JCS-23000131:6(649-677)Online publication date: 1-Jan-2023
    • (2023)A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge ComputingIEEE Internet of Things Journal10.1109/JIOT.2023.328204310:22(19795-19809)Online publication date: 15-Nov-2023
    • (2023)Sequential Computational Time-Released Encryption Technique Using Variable Time Delay2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT)10.1109/ICCCNT56998.2023.10306818(1-6)Online publication date: 6-Jul-2023
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media