
ACKNOWLEDGEMENTS
This work was supported by funding from the topic
Engineering Secure Systems of the Helmholtz As-
sociation (HGF) and by KASTEL Security Research
Labs (structure 46.23.02).
REFERENCES
Abadi, A. and Kiayias, A. (2021). Multi-instance publicly
verifiable time-lock puzzle and its applications. In Fi-
nancial Cryptography and Data Security: 25th Inter-
national Conference, FC 2021, Virtual Event, March
1–5, 2021, Revised Selected Papers, Part II 25, pages
541–559. Springer.
Abadi, A., Ristea, D., and Murdoch, S. J. (2023). Delegated
time-lock puzzle. arXiv preprint arXiv:2308.01280.
Abram, D., Roy, L., and Simkin, M. (2024). Time-based
cryptography from weaker assumptions: Randomness
beacons, delay functions and more. Cryptology ePrint
Archive.
Baseri, Y., Chouhan, V., and Hafid, A. (2024). Navigating
quantum security risks in networked environments: A
comprehensive study of quantum-safe network proto-
cols. Computers & Security, page 103883.
Baum, C., David, B. M., Pagnin, E., and Takahashi,
A. (2024). Cascade:(time-based) cryptography from
space communications delay. In International Con-
ference on Security and Cryptography for Networks,
pages 252–274. Springer.
Boneh, D., Bonneau, J., B
¨
unz, B., and Fisch, B. (2018).
Verifiable delay functions. In Annual international
cryptology conference, pages 757–788. Springer.
Boneh, D., Boyen, X., and Shacham, H. (2004). Short
group signatures. In Annual international cryptology
conference, pages 41–55. Springer.
Dujmovic, J., Garg, R., and Malavolta, G. (2024). Time-
lock puzzles with efficient batch solving. In Annual
International Conference on the Theory and Appli-
cations of Cryptographic Techniques, pages 311–341.
Springer.
Dwork, C. and Naor, M. (1992). Pricing via processing or
combatting junk mail. In Annual international cryp-
tology conference, pages 139–147. Springer.
Ephraim, N., Freitag, C., Komargodski, I., and Pass, R.
(2020). Continuous verifiable delay functions. In An-
nual International Conference on the Theory and Ap-
plications of Cryptographic Techniques, pages 125–
154. Springer.
Faleiro, R., Goul
˜
ao, M., Novo, L., and Cruzeiro, E. Z.
(2024). 1-shot oblivious transfer and 2-party com-
putation from noisy quantum storage. arXiv preprint
arXiv:2410.08367.
Mahmoody, M., Moran, T., and Vadhan, S. (2011). Time-
lock puzzles in the random oracle model. In Advances
in Cryptology–CRYPTO 2011: 31st Annual Cryptol-
ogy Conference, Santa Barbara, CA, USA, August 14-
18, 2011. Proceedings 31, pages 39–50. Springer.
Massias, H. and Quisquater, J. J. (1997). Time and cryptog-
raphy. US-patent n, 5:12.
Meadows, C. (2024). Formal verification of cryptosystems.
In Encyclopedia of Cryptography, Security and Pri-
vacy, pages 5–8. Springer.
Medley, L. (2023). A good use of time: Techniques and
applications of delay-based cryptography.
Parno, B., Raykova, M., and Vaikuntanathan, V. (2012).
How to delegate and verify in public: Verifiable com-
putation from attribute-based encryption. In Theory
of Cryptography: 9th Theory of Cryptography Con-
ference, TCC 2012, Taormina, Sicily, Italy, March 19-
21, 2012. Proceedings 9, pages 422–439. Springer.
Pietrzak, K. (2019). Simple verifiable delay functions. In
10th innovations in theoretical computer science con-
ference (itcs 2019). Schloss-Dagstuhl-Leibniz Zen-
trum f
¨
ur Informatik.
Ramadan, M., Li, F., Xu, C. X., Abdalla, A., and Abdalla,
H. (2016). An efficient end-to-end mutual authentica-
tion scheme for 2g-gsm system. In 2016 IEEE Inter-
national Conference on Big Data Analysis (ICBDA),
pages 1–6. IEEE.
Ramadan, M. and Raza, S. (2023). Secure equality
test technique using identity-based signcryption for
telemedicine systems. IEEE Internet of Things Jour-
nal, 10(18):16594–16604.
Rivest, R. L., Shamir, A., and Wagner, D. A. (1996). Time-
lock puzzles and timed-release crypto.
Schneier, B. (2007). Applied cryptography: protocols, al-
gorithms, and source code in C. john wiley & sons.
Shim, K.-A. (2021). A survey on post-quantum public-key
signature schemes for secure vehicular communica-
tions. IEEE Transactions on Intelligent Transporta-
tion Systems, pages 14025–14042.
Wesolowski, B. (2019). Efficient verifiable delay functions.
In Advances in Cryptology–EUROCRYPT 2019: 38th
Annual International Conference on the Theory and
Applications of Cryptographic Techniques, Darm-
stadt, Germany, May 19–23, 2019, Proceedings, Part
III 38, pages 379–407. Springer.
Wu, Q., Xi, L., Wang, S., Ji, S., Wang, S., and Ren, Y.
(2022). Verifiable delay function and its blockchain-
related application: A survey. Sensors, 22(19):7524.
Xue, C., Zhang, T., Zhou, Y., Nixon, M., Loveless, A., and
Han, S. (2024). Real-time scheduling for 802.1 qbv
time-sensitive networking (tsn): A systematic review
and experimental study. In 2024 IEEE 30th Real-Time
and Embedded Technology and Applications Sympo-
sium (RTAS), pages 108–121. IEEE.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
634