{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T14:40:08Z","timestamp":1750603208732,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819687244","type":"print"},{"value":"9789819687251","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8725-1_14","type":"book-chapter","created":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T14:23:23Z","timestamp":1750602203000},"page":"170-182","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Timed and\u00a0Decentralized Wireless Broadcasting System"],"prefix":"10.1007","author":[{"given":"Chi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,21]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","unstructured":"Afshar, A., Chung, K., Hsieh, Y., Lin, Y., Mahmoody, M.: On the (im)possibility of time-lock puzzles in the quantum random oracle model. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14441, pp. 339\u2013368. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-99-8730-6_11","DOI":"10.1007\/978-981-99-8730-6_11"},{"issue":"3","key":"14_CR2","first-page":"1799","volume":"20","author":"M Baee","year":"2023","unstructured":"Baee, M., Simpson, L., Boyen, X., Foo, E., Pieprzyk, J.: ALI: anonymous lightweight inter-vehicle broadcast authentication with encryption. IEEE Trans. Dependable Secur. Comput. 20(3), 1799\u20131817 (2023)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Baird, L., Mukherjee, P., Sinha, R.: i-TiRE: incremental timed-release encryption or how to use timed-release encryption on blockchains? In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) CCS 2022, pp. 235\u2013248. ACM (2022)","DOI":"10.1145\/3548606.3560704"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/978-3-662-44371-2_27","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"D Boneh","year":"2014","unstructured":"Boneh, D., Zhandry, M.: Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8616, pp. 480\u2013499. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44371-2_27"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Chan, A.C., Blake, I.F.: Scalable, server-passive, user-anonymous timed release cryptography. In: (ICDCS 2005), pp. 504\u2013513. IEEE Computer Society (2005)","DOI":"10.1109\/ICDCS.2005.72"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Provably secure timed-release public key encryption. ACM Trans. Inf. Syst. Secur. 11(2), 4:1\u20134:44 (2008)","DOI":"10.1145\/1330332.1330336"},{"key":"14_CR7","unstructured":"Choi, G., Vaudenay, S.: Timed-release encryption with master time bound key (extended). J. Wirel. Mob. Netw. Ubiquit. Comput. Dependable Appl. 10(4), 88\u2013108 (2019)"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-030-90567-5_17","volume-title":"Information Security and Privacy","author":"G Couteau","year":"2021","unstructured":"Couteau, G., Roscoe, A.W., Ryan, P.: Partially-fair computation from timed-release encryption and oblivious transfer. In: Baek, J., Ruj, S. (eds.) ACISP 2021. LNCS, vol. 13083, pp. 330\u2013349. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90567-5_17"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Dujmovic, J., Garg, R., Malavolta, G.: Time-lock puzzles with efficient batch solving. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024. LNCS, vol. 14652, pp. 311\u2013341. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58723-8_11","DOI":"10.1007\/978-3-031-58723-8_11"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/3-540-48329-2_40","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 93","author":"A Fiat","year":"1994","unstructured":"Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480\u2013491. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48329-2_40"},{"issue":"5","key":"14_CR11","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10207-015-0304-y","volume":"15","author":"K Kasamatsu","year":"2016","unstructured":"Kasamatsu, K., Matsuda, T., Emura, K., Attrapadung, N., Hanaoka, G., Imai, H.: Time-specific encryption from forward-secure encryption: generic and direct constructions. Int. J. Inf. Sec. 15(5), 549\u2013571 (2016)","journal-title":"Int. J. Inf. Sec."},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Kolonelos, D., Malavolta, G., Wee, H.: Distributed broadcast encryption from bilinear groups. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023. LNCS, vol. 14442, pp. 407\u2013441. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-99-8733-7_13","DOI":"10.1007\/978-981-99-8733-7_13"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Liu, Y., Wang, Q., Yiu, S.: Towards practical homomorphic time-lock puzzles: Applicability and verifiability. In: Atluri, V., Pietro, R.D., Jensen, C.D., Meng, W. (eds.) ESORICS 2022. LNCS, vol. 13554, pp. 424\u2013443. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-17140-6_21","DOI":"10.1007\/978-3-031-17140-6_21"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Loe, A.F., Medley, L., O\u2019Connell, C., Quaglia, E.A.: TIDE: a novel approach to constructing timed-release encryption. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) ACISP 2022. LNCS, vol. 13494, pp. 244\u2013264. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22301-3_13","DOI":"10.1007\/978-3-031-22301-3_13"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/3-540-45537-X_27","volume-title":"Selected Areas in Cryptography","author":"W Mao","year":"2001","unstructured":"Mao, W.: Timed-release cryptography. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 342\u2013357. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45537-X_27"},{"key":"14_CR16","first-page":"100820","volume":"49","author":"S Niu","year":"2024","unstructured":"Niu, S., Dong, R., Liu, W., Ge, P., Liu, Q.: Broadcast signcryption scheme with equality test in smart transportation system. Veh. Commun. 49, 100820 (2024)","journal-title":"Veh. Commun."},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15317-4_1","volume-title":"Security and Cryptography for Networks","author":"KG Paterson","year":"2010","unstructured":"Paterson, K.G., Quaglia, E.A.: Time-specific encryption. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 1\u201316. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_1"},{"key":"14_CR18","unstructured":"Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto (1996)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Wu, Q., Qin, B., Zhang, L., Domingo-Ferrer, J.: Ad hoc broadcast encryption. In: Al-Shaer, E., Keromytis, A.D., Shmatikov, V. (eds.) CCS 2010, pp. 741\u2013743. ACM (2010)","DOI":"10.1145\/1866307.1866416"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Yuan, K., Wang, Y., Zeng, Y., Ouyang, W., Li, Z., Jia, C.: Provably secure security-enhanced timed-release encryption in the random oracle model. Secur. Commun. Networks 2021, 5593363:1\u20135593363:10 (2021)","DOI":"10.1155\/2021\/5593363"},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"4830","DOI":"10.1109\/TIFS.2023.3299466","volume":"18","author":"J Zhang","year":"2023","unstructured":"Zhang, J., Su, S., Zhong, H., Cui, J., He, D.: Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs. IEEE Trans. Inf. Forensics Secur. 18, 4830\u20134842 (2023)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"14_CR22","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1109\/TVT.2021.3113660","volume":"71","author":"H Zhong","year":"2022","unstructured":"Zhong, H., Zhang, S., Cui, J., Wei, L., Liu, L.: Broadcast encryption scheme for V2I communication in VANETs. IEEE Trans. Veh. Technol. 71(3), 2749\u20132760 (2022)","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Lecture Notes in Computer Science","Wireless Artificial Intelligent Computing Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8725-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T14:23:24Z","timestamp":1750602204000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8725-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819687244","9789819687251"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8725-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"21 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Artificial Intelligent Computing Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tokyo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2025\/index.html#","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}