TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Timelock Encryption made possible and easy to use

124 点作者 anomalroil将近 3 年前

14 条评论

eis将近 3 年前
I was curious how this could work and spotted this sentence in the README:<p>&gt; In practice this means that if you trust there are never more than the threshold t malicious nodes on the network you&#x27;re relying on, you are guaranteed that you timelocked data cannot be decrypted earlier than what you intended.<p>So I guess this just relies on a multi key threshold scheme where t nodes have to combine their keys to decrypt the data. And I assume the blockchain tries to punish participants who refuse to take part in the decryption?<p>If so then this seems very tricky in terms of risk because if you have more than t malicious nodes they can secretely collude outside the chain to decrypt the data before the specified time and you&#x27;d never know in contrast to the usual attacks on blockchains which are very obvious. So the chain in that regard does not and can not add to keep the actors honest in that regard.<p>Would love to see the DEF CON presentation but I couldn&#x27;t find a video for it. Didn&#x27;t even spot it in the DEF CON timetable.
评论 #32477855 未加载
评论 #32479946 未加载
layer8将近 3 年前
So, effectively this encrypts a message for a public key whose corresponding private-key owner promises to only decrypt it after the specified time. Except that the owner here is a distributed network, so the promise can only be broken by a majority of the network.<p>The main assumption here is that said network will still be operational, publicly accessible and non-compromised at decryption time.
评论 #32479870 未加载
cassonmars将近 3 年前
This is not Timelock encryption. Timelock encryption relies on the use of time lock puzzles, which frequently revolve around variations of repeatedly squaring a value in a particular way which makes it impossible to shortcut without knowing the original setup parameters. Variations include a RSA-style approach (which I&#x27;ve created an open source repo here: <a href="https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Timelock" rel="nofollow">https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Timelock</a>), or by omitting knowledge of the order of the group (possible with imaginary quadratic cryptography), creating a verifiable delay function, such as the Wesolowski VDF (repo: <a href="https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Wesolowski-VDF" rel="nofollow">https:&#x2F;&#x2F;www.github.com&#x2F;CassOnMars&#x2F;Wesolowski-VDF</a>).
评论 #32479829 未加载
评论 #32478991 未加载
评论 #32478850 未加载
评论 #32481412 未加载
dannyobrien将近 3 年前
I don&#x27;t quite understand how this works. I get that the League of Entropy is a verifiable timestamped network source of randomness, but how does this let you set a future time for decrypting something that you encrypt now. How do you depend on a quality of the random source in the future, when by definition that can&#x27;t be predictable?
评论 #32477744 未加载
anonporridge将近 3 年前
How does this establish that we can trust the oracles telling us what time it is?<p>The only way I could see this working very long term and for important data is by using the bitcoin blockchain (often called the timechain) as a clock that literally can&#x27;t be cheated because the proof of work allows you to independently verify that some amount of real world energy and computational machines were consumed to lock in every block. Otherwise, how do you not end up with a Byzantine generals problem?<p>But maybe I lack imagination.
评论 #32477935 未加载
评论 #32488236 未加载
anomalroil将近 3 年前
Encrypting something that cannot be decrypted until a given future date is now possible :D This was presented on Friday at DEF CON, and there&#x27;s also a web demo to try it out using the second compatible TS library: <a href="https:&#x2F;&#x2F;timevault.drand.love&#x2F;" rel="nofollow">https:&#x2F;&#x2F;timevault.drand.love&#x2F;</a>
评论 #32476100 未加载
评论 #32477017 未加载
slaymaker1907将近 3 年前
A cool application of this could be to release currently closed source code encrypted until some number of years in the future (10 or 20 would be my guess) at which point anyone holding the original encrypted source could view the plaintext. I&#x27;d rather vendors just open source in the first place, but this could be a nice way to have a sort of smart contract guaranteeing future access to source code.
评论 #32478135 未加载
ljlolel将近 3 年前
I saw this talk in person at DEFCON. Great talk
评论 #32478063 未加载
RealityVoid将近 3 年前
I&#x27;m reminded of this comment: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=31556968" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=31556968</a><p>The guy claims to be doing timelock using Galileo timestamps.
eximius将近 3 年前
Something to do with encrypting using a hash of the round number and pair encryption based off a chosen chain&#x27;s public key. I&#x27;m still processing the pair encryption bits.
评论 #32477976 未加载
ggm将近 3 年前
timelock has existed since ephemeral key lodgement with an escrow under instruction was first stated as an idea. I imagine it was close to when trusted third parties launched, with timestamping services. take timestamp from TTP #1 and lodge keys with TTP #2 under instructions.
评论 #32478090 未加载
Temporary_31337将近 3 年前
I&#x27;m trying to think of use cases as the readme also suggest a threshold timestamp AFTER which things can&#x27;t be decrypted (I guess for things like log rotation?) and I think that simply deleting (overwriting securely or whatever) would be far less resource intensive?
评论 #32478064 未加载
评论 #32477769 未加载
drdrek将近 3 年前
Why not just send the Decryption key after X time has elapsed? You do not even trust yourself?<p>If you really want to make it vulnerable to 51% attacks you can also split the cypher and send it to a lot of different people to be reassembled in a later date.
ranger_danger将近 3 年前
Couldn&#x27;t one just change the date&#x2F;time on their machine? Please explain how this won&#x27;t work.
评论 #32477990 未加载
评论 #32476849 未加载