SoK: Delay-Based Cryptography

9Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this work, we provide a systematisation of knowledge of delay-based cryptography, in which we discuss and compare the existing primitives within cryptography that utilise a time-delay. We start by considering the role of time within cryptography, explaining broadly what a delay aimed to achieve at its inception and now, in the modern age. We then move on to describing the underlying assumptions used to achieve these goals, and analyse topics including trust, decentralisation and concrete methods to implement a delay. We then survey the existing primitives, discussing their security properties, instantiations and applications. We make explicit the relationships between these primitives, identifying a hierarchy and the theoretical gaps that exist. We end this systematisation of knowledge by highlighting relevant future research directions within the field of delay-based cryptography, from which this area would greatly benefit.

Author supplied keywords

Cite

CITATION STYLE

APA

Medley, L., Loe, A. F., & Quaglia, E. A. (2023). SoK: Delay-Based Cryptography. In Proceedings - IEEE Computer Security Foundations Symposium (Vol. 2023-July, pp. 169–183). IEEE Computer Society. https://doi.org/10.1109/CSF57540.2023.00028

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free