Would this work?  Maybe it's too simple.

1.  A sends B an encrypted file.

2.  Sometime later, A sends B the decryption key.

I haven't had a chance to read all the links listed here, yet, due to the
press of other matters.  

It does sound like an interesting problem, which may depend on a Trusted
Third Party, which we know doesn't exist, or launching rocket ships, which
is costly.  I was just thinking that if it is OK to trust oneself to later
send the key, then that might work, modulo an accident or personal lapse.
--
pj

re: subject - it is, of course, 'dependent' with e three times, no a.

On Wed, 8 Mar 2000 [EMAIL PROTECTED] wrote:

> 
> 
> I think the secret sharing direction as Raph has described below is indeed
> the most reasonable way to solve this problem. In fact, for a long time,
> I've considered such a `secure long term archive` one of the important
> applications to the work we've been doing on Proactive security, which
> takes secret sharing forward by periodically refreshing the shares. (BTW,
> this is where I have a huge problem with Cryptonomicon!!)
> 
> Here are some relevant works:
> 
> For reference to most works on proactive security see our `proactive
> security homepage` at http://www.hrl.il.ibm.com/Proactive/index.html. For
> an easy overview see R.Canetti, R.Gennaro, A.Herzberg and D.Naor. Proactive
> Security: Long-term protection against break-ins. CryptoBytes RSA
> Laboratories Newsletter, August 1997.
> 
> To see how to keep the clocks synchronized in such mobile adversary
> setting... ask me, it's a new result and we haven't put in the site yet -
> hope to do it soon
> 
> to see how to keep the storage requirements reasonable see:
> Krawczyk, H., "Secret Sharing Made Short" Advances in Cryptology -- CRYPTO
> 93 Proceedings, Lecture Notes in Computer Science Vol. 773,
> Springer-Verlag, D. R. Stinson, ed , 1993, pp. 136-146.
> Krawczyk, H., "Distributed Fingerprints and Secure Information Dispersal",
> Proceedings of the Twelfth Annual ACM Symposium on Principles of
> Distributed Computing (PODC'93), 1993, pp. 207-218.
> 
> here are two papers addressing exactly the time-release crypto problem:
> 
> M. Kudo, "Distributed Time-Key Cryptosystem By Using Three-Party
> Timestamping Protocol," IBM Research Report, RT5141, 1998.
> http://net55.trl.ibm.com/kudo/Publication/ResRep1/crypto.pdf
> 
> Note: I hope the above URL is on the Internet and not our Intranet... also
> I believe Kudo-san and collugues have a follow on paper in which they
> actually claim proactive security but I need to dig this up
>  (it appeared in some crypto conf in Singapore very late on 1999, not CCS,
> was it AsiaCrypt?) I'm copying Kudo-san so he can send us (or at least me
> the exact reference...
> 
> Conditional Oblivious Transfer and Timed-Release Encryption
> Giovanni Di Crescenzo, Rafail Ostrovsky, and S. Rajagopalan Computer
> Science Department, University of California San Diego,
> http://www.argreenhouse.com/papers/rafail/42.ps
> 
> Best Regards,
> Amir Herzberg
> Manager, E-Business and Security Technologies
> IBM Research Lab in Haifa (Tel Aviv Office)
> http://www.hrl.il.ibm.com
> New e-mail: [EMAIL PROTECTED]
> New Lotus notes mail: amir herzberg/haifa/ibm@IBMIL
> 
> 
> Raph Levien <[EMAIL PROTECTED]> on 08/03/2000 00:09:11
> 
> Please respond to Raph Levien <[EMAIL PROTECTED]>
> 
> To:   "Cryptography" <[EMAIL PROTECTED]>
> cc:   "Arrianto Mukti Wibowo" <[EMAIL PROTECTED]> (bcc: Amir
>       Herzberg/Haifa/IBM)
> Subject:  time dependant
> 
> 
> 
> 
> mukti wrote:
> > I want to know whether there is a crypto building block which doesn't
> allow
> > someone to open an encrypted message before a certain date.
> 
> The way I'd do this is to split up the encryption key with a shared
> secret scheme, then give the shares to a number of trusted third
> parties, who agree to release the shares at the agreed-upon time and
> no sooner. If they all decide to cheat on their agreement, then you
> lose, although if the fraction over your threshold decide to stay
> honest, then you win even if the rest cheat.
> 
> It sounds like there might be a business in this. It's relatively
> straightforward to implement, and there don't seem to be any
> excruciatingly difficult issues of trust and policy, just whether or
> not the trusted third party is going to follow the agreement.
> 
> Raph
> 
> 
> 
> 
> 
> 


Reply via email to