{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T14:43:14Z","timestamp":1750603394748,"version":"3.37.3"},"reference-count":39,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,5,27]],"date-time":"2021-05-27T00:00:00Z","timestamp":1622073600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&D Program of China","award":["2018YFA0704703","61802111","61972073","61972215"],"award-info":[{"award-number":["2018YFA0704703","61802111","61972073","61972215"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFA0704703","61802111","61972073","61972215"],"award-info":[{"award-number":["2018YFA0704703","61802111","61972073","61972215"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,5,27]]},"abstract":"<jats:p>Cryptographic primitive of timed-release encryption (TRE) enables the sender to encrypt a message which only allows the designated receiver to decrypt after a designated time. Combined with other encryption technologies, TRE technology is applied to a variety of scenarios, including regularly posting on the social network and online sealed bidding. Nowadays, in order to control the decryption time while maintaining anonymity of user identities, most TRE solutions adopt a noninteractive time server mode to periodically broadcast time trapdoors, but because these time trapdoors are generated with fixed time server\u2019s private key, many \u201cciphertexts\u201d related to the time server\u2019s private key that can be cryptanalyzed are generated, which poses a big challenge to the confidentiality of the time server\u2019s private key. To work this out, we propose a concrete scheme and a generic scheme of security-enhanced TRE (SETRE) in the random oracle model. In our SETRE schemes, we use fixed and variable random numbers together as the time server\u2019s private key to generate the time trapdoors. We formalize the definition of SETRE and give a provably secure concrete construction of SETRE. According to our experiment, the concrete scheme we proposed reduces the computational cost by about 10.8% compared to the most efficient solution in the random oracle model but only increases the almost negligible storage space. Meanwhile, it realizes one-time pad for the time trapdoor. To a large extent, this increases the security of the time server\u2019s private key. Therefore, our work enhances the security and efficiency of the TRE.<\/jats:p>","DOI":"10.1155\/2021\/5593363","type":"journal-article","created":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:21:15Z","timestamp":1622161275000},"page":"1-10","source":"Crossref","is-referenced-by-count":5,"title":["Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9388-5690","authenticated-orcid":true,"given":"Ke","family":"Yuan","sequence":"first","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng 475004, China"},{"name":"International Joint Research Laboratory for Cooperative Vehicular Networks of Henan, Henan University, Kaifeng 475004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1151-8652","authenticated-orcid":true,"given":"Yahui","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng 475004, China"},{"name":"International Joint Research Laboratory for Cooperative Vehicular Networks of Henan, Henan University, Kaifeng 475004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4435-1385","authenticated-orcid":true,"given":"Yingming","family":"Zeng","sequence":"additional","affiliation":[{"name":"Beijing Institute of Computer Technology and Applications, Beijing 100854, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3991-1541","authenticated-orcid":true,"given":"Wenlei","family":"Ouyang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng 475004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0933-589X","authenticated-orcid":true,"given":"Zheng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Henan University, Kaifeng 475004, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5588-9690","authenticated-orcid":true,"given":"Chunfu","family":"Jia","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Nankai University, Tianjin 300350, China"}]}],"member":"311","reference":[{"key":"1","unstructured":"RivestR. L.ShamirA.WagnerD. A.Time-lock puzzles and timed-release crypto1996Cambridge, MA, USAMIT LCS TechTechnical Report MIT\/LCS\/TR-684"},{"volume-title":"Timed-release Crypto","year":"1993","author":"T. May","key":"2"},{"issue":"3","key":"3","first-page":"1","article-title":"Determination of young generation\u2019s sensitivity to the destructive stimuli based on the information in social networks","volume":"9","author":"B. Alexander","year":"2019","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"issue":"4","key":"4","first-page":"109","article-title":"Reference architecture for social networks graph analysis","volume":"10","author":"M. Kolomeets","year":"2019","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"key":"5","article-title":"Wireless edge caching based on content similarity in dynamic environments","volume":"115","author":"X. Wei","year":"2021","journal-title":"Journal of Systems Architecture"},{"key":"6","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1016\/j.ins.2019.05.059","article-title":"Fsse: forward secure searchable encryption with keyed-block chains","volume":"500","author":"W. Yu","year":"2019","journal-title":"Information Sciences"},{"issue":"2","key":"7","first-page":"1","article-title":"An efficient symmetric searchable encryption scheme for cloud storage","volume":"7","author":"X. Jiang","year":"2017","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"first-page":"160","article-title":"The hp time vault service: exploiting ibe for timed release of confidential information","author":"M. M. Casassa","key":"8"},{"first-page":"504","article-title":"Scalable, server-passive, user-anonymous timed release cryptography","author":"A. C.-F. Chan","key":"9"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_25"},{"first-page":"158","article-title":"Revisiting the security model for timed-release encryption with pre-open capability","author":"W. D. Alexander","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_21"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330336"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22497-3_21"},{"first-page":"39","article-title":"Time-lock puzzles in the random oracle model","author":"M. Mohammad","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-014-0295-x"},{"issue":"4","key":"17","first-page":"760","article-title":"Public key timed-release searchable encryption in one-to-many scenarios","volume":"43","author":"K. Yuan","year":"2015","journal-title":"Acta Electronica Sinica"},{"first-page":"345","article-title":"Time-lock puzzles from randomized encodings","author":"N. Bitansky","key":"18"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.12.008"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4364"},{"issue":"3","key":"21","first-page":"588","article-title":"Research on timed access of sensitive data based on dual encryption","volume":"46","author":"W. Chen","year":"2017","journal-title":"Journal of University of Electronic Science and Technology of China"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2014.2385778"},{"issue":"3","key":"23","first-page":"78","article-title":"Conjunctive keyword search with designated tester and timing enabled proxy reencryption in health cloud","volume":"4","author":"S. Y. Patil","year":"2017","journal-title":"International Journal for Innovative Research in Science and Technology"},{"key":"24","article-title":"Secure data group sharing and dissemination with attribute and time conditions in public cloud","volume":"99","author":"Q. Huang","year":"2018","journal-title":"IEEE Transactions on Services Computing"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-016-0324-2"},{"issue":"2","key":"26","first-page":"210","article-title":"Bidding model based on timed-release encryption and blockchain","volume":"49","author":"H. Cao","year":"2019","journal-title":"Journal of Henan University (Natural Science)"},{"issue":"4","key":"27","first-page":"88","article-title":"Timed-release encryption with master time bound key (extended)","volume":"10","author":"G. Choi","year":"2019","journal-title":"Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2017.2682090"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_8"},{"issue":"9","key":"30","first-page":"2795","article-title":"New timed-release encryption based on indistinguishability obfuscation","volume":"34","author":"T. Wang","year":"2017","journal-title":"Application Research of Computers"},{"issue":"10","key":"31","first-page":"530","article-title":"Time-release protocol from bitcoin and witness encryption for sat","volume":"40","author":"L. Jia","year":"2015","journal-title":"Korean Circulation Journal"},{"first-page":"213","article-title":"Decentralized release of self-emerging data using smart contracts","author":"C. Li","key":"32"},{"key":"33","doi-asserted-by":"crossref","first-page":"2549","DOI":"10.1007\/s10623-018-0461-x","article-title":"How to build time-lock encryption","volume":"86","author":"L. Jia","year":"2018","journal-title":"Designs, Codes and Cryptography"},{"first-page":"302","article-title":"A fully decentralized time-lock encryption system on blockchain","author":"W. Lai","key":"34"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2015.2389959"},{"issue":"4","key":"36","first-page":"37","article-title":"Expressive ciphertext-policy attribute-based encryption with fast decryption","volume":"8","author":"H. Tsuchida","year":"2018","journal-title":"Journal of Internet Services and Information Security (JISIS)"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_30"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_14"},{"key":"39","article-title":"Encodeore: reducing leakage and preserving practicality in order-revealing encryption","volume":"XX","author":"Z. Liu","year":"2020","journal-title":"IEEE Transactions on Dependable and Secure Computing"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5593363.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5593363.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5593363.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T00:21:35Z","timestamp":1622161295000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5593363\/"}},"subtitle":[],"editor":[{"given":"Hao","family":"Peng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,5,27]]},"references-count":39,"alternative-id":["5593363","5593363"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5593363","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,5,27]]}}}