2021
DOI: 10.1007/978-3-030-68890-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Security Definitions on Time-Lock Puzzles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…In 1996, Rivest et al 4 first proposed two preliminary TRE construction schemes, the first is TLP scheme based on factorization problem, and the second is the sender issues time and message to the agent, which laid the theoretical foundation for the sustainable research of TRE. So far, the construction of TRE scheme includes TLP [5][6][7][8][9][10] , agents [11][12][13][14][15][16][17] and other methods [18][19][20][21][22][23] . In the TRE scheme constructed based on TLP, the decryption key is hidden in a mathematical formula.…”
Section: Introductionmentioning
confidence: 99%
“…In 1996, Rivest et al 4 first proposed two preliminary TRE construction schemes, the first is TLP scheme based on factorization problem, and the second is the sender issues time and message to the agent, which laid the theoretical foundation for the sustainable research of TRE. So far, the construction of TRE scheme includes TLP [5][6][7][8][9][10] , agents [11][12][13][14][15][16][17] and other methods [18][19][20][21][22][23] . In the TRE scheme constructed based on TLP, the decryption key is hidden in a mathematical formula.…”
Section: Introductionmentioning
confidence: 99%