International Journal of Information Security

, Volume 15, Issue 5, pp 549–571 | Cite as

Time-specific encryption from forward-secure encryption: generic and direct constructions

  • Kohei KasamatsuEmail author
  • Takahiro Matsuda
  • Keita Emura
  • Nuttapong Attrapadung
  • Goichiro Hanaoka
  • Hideki Imai
Regular Contribution


Paterson and Quaglia (SCN 2010) proposed the concept of time-specific encryption (TSE) and its efficient constructions. TSE is a type of public-key encryption with an additional functionality where an encryptor can specify a suitable time interval, meaning that the ciphertexts may only be decrypted within this time interval. In this work, we propose a new methodology for designing efficient TSE schemes by using forward-secure encryption (FSE), and based on this methodology, we present a specific TSE scheme using Boneh–Boyen–Goh FSE, and a generic construction from any FSE. Our proposed TSE schemes are practical in all aspects with regard to computational costs and data sizes. The sizes of the ciphertext and the public parameter in our schemes are significantly smaller than those in previous schemes in an asymptotic sense.


Time-specific encryption Forward-secure encryption Hierarchical identity-based encryption 


  1. 1.
    Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J. Cryptol. 21(3), 350–391 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Anderson, R.J.: Two remarks on public key cryptology. invited lecture. In: ACM Conference on Computer and Communications Security (1997).
  3. 3.
    Attrapadung, N., Imai, H.: Graph-decomposition-based frameworks for subset-cover broadcast encryption and efficient instantiations. In: ASIACRYPT, pp. 100–120 (2005)Google Scholar
  4. 4.
    Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)Google Scholar
  5. 5.
    Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: EUROCRYPT, pp. 223–238 (2004)Google Scholar
  6. 6.
    Boneh, D., Boyen, X., Goh, E.J.: Hierarchical identity based encryption with constant size ciphertext. IACR Cryptol. ePrint Arch. 2005, 15 (2005)MathSciNetzbMATHGoogle Scholar
  7. 7.
    Boneh, D., Franklin, M.K.: Identity-based encryption from the weil pairing. In: CRYPTO, pp. 213–229 (2001)Google Scholar
  8. 8.
    Boneh, D., Gentry, C., Waters, B.: Collusion resistant broadcast encryption with short ciphertexts and private keys. In: CRYPTO, pp. 258–275 (2005)Google Scholar
  9. 9.
    Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: TCC, pp. 535–554 (2007)Google Scholar
  10. 10.
    Canetti, R., Halevi, S., Katz, J.: A forward-secure public-key encryption scheme. In: EUROCRYPT, pp. 255–271 (2003)Google Scholar
  11. 11.
    Cathalo, J., Libert, B., Quisquater, J.J.: Efficient and non-interactive timed-release encryption. In: ICICS, pp. 291–303 (2005)Google Scholar
  12. 12.
    Chan, A.C.F., Blake, I.F.: Scalable, server-passive, user-anonymous timed release cryptography. In: ICDCS, pp. 504–513 (2005)Google Scholar
  13. 13.
    Chen, C., Zhang, Z., Feng, D.: Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. In: ProvSec, pp. 84–101 (2011)Google Scholar
  14. 14.
    Cheon, J.H., Hopper, N., Kim, Y., Osipkov, I.: Provably secure timed-release public key encryption. ACM Trans. Inf. Syst. Secur. 11(2), 4 (2008)CrossRefzbMATHGoogle Scholar
  15. 15.
    Chow, S.S.M., Roth, V., Rieffel, E.G.: General certificateless encryption and timed-release encryption. In: SCN, pp. 126–143 (2008)Google Scholar
  16. 16.
    Dent, A.W., Tang, Q.: Revisiting the security model for timed-release encryption with pre-open capability. In: ISC, pp. 158–174 (2007)Google Scholar
  17. 17.
    Dodis, Y., Katz, J.: Chosen-ciphertext security of multiple encryption. In: TCC, pp. 188–209 (2005)Google Scholar
  18. 18.
    Emura, K., Miyaji, A., Nomura, A., Omote, K., Soshi, M.: A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. In: ISPEC, pp. 13–23 (2009)Google Scholar
  19. 19.
    Emura, K., Miyaji, A., Omote, K.: Adaptive secure-channel free public-key encryption with keyword search implies timed release encryption. In: ISC, pp. 102–118 (2011)Google Scholar
  20. 20.
    Fiat, A., Naor, M.: Broadcast encryption. In: CRYPTO, pp. 480–491 (1993)Google Scholar
  21. 21.
    Fuhr, T., Paillier, P.: Decryptable searchable encryption. In: ProvSec, pp. 228–236 (2007)Google Scholar
  22. 22.
    Ge, A., Zhang, R., Chen, C., Ma, C., Zhang, Z.: Threshold ciphertext policy attribute-based encryption with constant size ciphertexts. In: ACISP, pp. 336–349 (2012)Google Scholar
  23. 23.
    Gentry, C.: Practical identity-based encryption without random oracles. In: EUROCRYPT, pp. 445–464 (2006)Google Scholar
  24. 24.
    Gentry, C., Waters, B.: Adaptive security in broadcast encryption systems (with short ciphertexts). In: EUROCRYPT, pp. 171–188 (2009)Google Scholar
  25. 25.
    Herranz, J., Laguillaumie, F., Ràfols, C.: Constant size ciphertexts in threshold attribute-based encryption. In: Public Key Cryptography, pp. 19–34 (2010)Google Scholar
  26. 26.
    Hofheinz, D., Weinreb, E.: Searchable encryption with decryption in the standard model. IACR Cryptol. ePrint Arch. 2008, 423 (2008)Google Scholar
  27. 27.
    Hwang, Y.H., Yum, D.H., Lee, P.J.: Timed-release encryption with pre-open capability and its application to certified e-mail system. In: ISC, pp. 344–358 (2005)Google Scholar
  28. 28.
    Kasamatsu, K., Matsuda, T., Emura, K., Attrapadung, N., Hanaoka, G., Imai, H.: Time-specific encryption from forward-secure encryption. In: SCN, pp. 184–204 (2012)Google Scholar
  29. 29.
    Matsuda, T., Nakai, Y., Matsuura, K.: Efficient generic constructions of timed-release encryption with pre-open capability. In: Pairing, pp. 225–245 (2010)Google Scholar
  30. 30.
  31. 31.
    Nakai, Y., Matsuda, T., Kitada, W., Matsuura, K.: A generic construction of timed-release encryption with pre-open capability. In: IWSEC, pp. 53–70 (2009)Google Scholar
  32. 32.
    Paterson, K.G., Quaglia, E.A.: Time-specific encryption. In: SCN, pp. 1–16 (2010)Google Scholar
  33. 33.
    Rivest, R.L., Shamir, A., Wagner, D.A.: Time-lock puzzles and timed-release crypto. Tech. rep., Cambridge, MA, USA (1996)Google Scholar
  34. 34.
    Shamir, A.: Identity-based cryptosystems and signature schemes. In: CRYPTO, pp. 47–53 (1984)Google Scholar
  35. 35.
    Tang, Q., Chen, X.: Towards asymmetric searchable encryption with message recovery and flexible search authorization. In: ASIACCS, pp. 253–264 (2013)Google Scholar
  36. 36.
    Waters, B.: Efficient identity-based encryption without random oracles. In: EUROCRYPT, pp. 114–127 (2005)Google Scholar
  37. 37.
    Waters, B.: Dual system encryption: Realizing fully secure IBE and HIBE under simple assumptions. In: CRYPTO, pp. 619–636 (2009)Google Scholar
  38. 38.
    Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Public Key Cryptography, pp. 53–70 (2011)Google Scholar
  39. 39.
    Zhang, R., Hanaoka, G., Shikata, J., Imai, H.: On the security of multiple encryption or CCA-security+CCA-security=CCA-security? In: Public Key Cryptography, pp. 360–374 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2015

Authors and Affiliations

  • Kohei Kasamatsu
    • 1
    Email author
  • Takahiro Matsuda
    • 2
  • Keita Emura
    • 3
  • Nuttapong Attrapadung
    • 2
  • Goichiro Hanaoka
    • 2
  • Hideki Imai
    • 4
  1. 1.NTT Software CorporationYokohamaJapan
  2. 2.National Institute of Advanced Industrial Science and Technology (AIST)TokyoJapan
  3. 3.National Institute of Information and Communications Technology (NICT)TokyoJapan
  4. 4.The University of TokyoTokyoJapan

Personalised recommendations