TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Timelock Encryption made possible and easy to use

124 pointsby anomalroilalmost 3 years ago

14 comments

eisalmost 3 years ago
I was curious how this could work and spotted this sentence in the README:<p>&gt; In practice this means that if you trust there are never more than the threshold t malicious nodes on the network you&#x27;re relying on, you are guaranteed that you timelocked data cannot be decrypted earlier than what you intended.<p>So I guess this just relies on a multi key threshold scheme where t nodes have to combine their keys to decrypt the data. And I assume the blockchain tries to punish participants who refuse to take part in the decryption?<p>If so then this seems very tricky in terms of risk because if you have more than t malicious nodes they can secretely collude outside the chain to decrypt the data before the specified time and you&#x27;d never know in contrast to the usual attacks on blockchains which are very obvious. So the chain in that regard does not and can not add to keep the actors honest in that regard.<p>Would love to see the DEF CON presentation but I couldn&#x27;t find a video for it. Didn&#x27;t even spot it in the DEF CON timetable.
评论 #32477855 未加载
评论 #32479946 未加载
layer8almost 3 years ago
So, effectively this encrypts a message for a public key whose corresponding private-key owner promises to only decrypt it after the specified time. Except that the owner here is a distributed network, so the promise can only be broken by a majority of the network.<p>The main assumption here is that said network will still be operational, publicly accessible and non-compromised at decryption time.
评论 #32479870 未加载
cassonmarsalmost 3 years ago
This is not Timelock encryption. Timelock encryption relies on the use of time lock puzzles, which frequently revolve around variations of repeatedly squaring a value in a particular way which makes it impossible to shortcut without knowing the original setup parameters. Variations include a RSA-style approach (which I&#x27;ve created an open source repo here: <a href="https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Timelock" rel="nofollow">https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Timelock</a>), or by omitting knowledge of the order of the group (possible with imaginary quadratic cryptography), creating a verifiable delay function, such as the Wesolowski VDF (repo: <a href="https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Wesolowski-VDF" rel="nofollow">https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Wesolowski-VDF</a>).
评论 #32479829 未加载
评论 #32478991 未加载
评论 #32478850 未加载
评论 #32481412 未加载
dannyobrienalmost 3 years ago
I don&#x27;t quite understand how this works. I get that the League of Entropy is a verifiable timestamped network source of randomness, but how does this let you set a future time for decrypting something that you encrypt now. How do you depend on a quality of the random source in the future, when by definition that can&#x27;t be predictable?
评论 #32477744 未加载
anonporridgealmost 3 years ago
How does this establish that we can trust the oracles telling us what time it is?<p>The only way I could see this working very long term and for important data is by using the bitcoin blockchain (often called the timechain) as a clock that literally can&#x27;t be cheated because the proof of work allows you to independently verify that some amount of real world energy and computational machines were consumed to lock in every block. Otherwise, how do you not end up with a Byzantine generals problem?<p>But maybe I lack imagination.
评论 #32477935 未加载
评论 #32488236 未加载
anomalroilalmost 3 years ago
Encrypting something that cannot be decrypted until a given future date is now possible :D This was presented on Friday at DEF CON, and there&#x27;s also a web demo to try it out using the second compatible TS library: <a href="https:&#x2F;&#x2F;timevault.drand.love&#x2F;" rel="nofollow">https:&#x2F;&#x2F;timevault.drand.love&#x2F;</a>
评论 #32476100 未加载
评论 #32477017 未加载
slaymaker1907almost 3 years ago
A cool application of this could be to release currently closed source code encrypted until some number of years in the future (10 or 20 would be my guess) at which point anyone holding the original encrypted source could view the plaintext. I&#x27;d rather vendors just open source in the first place, but this could be a nice way to have a sort of smart contract guaranteeing future access to source code.
评论 #32478135 未加载
ljlolelalmost 3 years ago
I saw this talk in person at DEFCON. Great talk
评论 #32478063 未加载
RealityVoidalmost 3 years ago
I&#x27;m reminded of this comment: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=31556968" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=31556968</a><p>The guy claims to be doing timelock using Galileo timestamps.
eximiusalmost 3 years ago
Something to do with encrypting using a hash of the round number and pair encryption based off a chosen chain&#x27;s public key. I&#x27;m still processing the pair encryption bits.
评论 #32477976 未加载
ggmalmost 3 years ago
timelock has existed since ephemeral key lodgement with an escrow under instruction was first stated as an idea. I imagine it was close to when trusted third parties launched, with timestamping services. take timestamp from TTP #1 and lodge keys with TTP #2 under instructions.
评论 #32478090 未加载
Temporary_31337almost 3 years ago
I&#x27;m trying to think of use cases as the readme also suggest a threshold timestamp AFTER which things can&#x27;t be decrypted (I guess for things like log rotation?) and I think that simply deleting (overwriting securely or whatever) would be far less resource intensive?
评论 #32478064 未加载
评论 #32477769 未加载
drdrekalmost 3 years ago
Why not just send the Decryption key after X time has elapsed? You do not even trust yourself?<p>If you really want to make it vulnerable to 51% attacks you can also split the cypher and send it to a lot of different people to be reassembled in a later date.
ranger_dangeralmost 3 years ago
Couldn&#x27;t one just change the date&#x2F;time on their machine? Please explain how this won&#x27;t work.
评论 #32477990 未加载
评论 #32476849 未加载