1. Bitansky, N., Goldwasser, S., Jain, A., Paneth, O., Waters, B.: Time-lock puzzles from randomized encodings. In: ACM Conference on Innovations in Theoretical Computer Science, pp. 345–356. ACM (2016)
2. Cao, H., Yuan, K., Wang, Y., Yan, Y., Zhou, L., Chai, X.: Bidding model based on timed-release encryption and blockchain. J. Henan Univ. (Nat. Sci.) 49(2), 210–217 (2019)
3. Lecture Notes in Computer Science;K Chalkias,2007
4. Chan, A.F., Blake, I.F.: Scalable, server-passive, user-anonymous timed release cryptography. In: . Proceedings 25th IEEE International Conference on Distributed Computing Systems. ICDCS 2005, pp. 504–513. IEEE (2005)
5. Chen, W., Wang, Y., Qin, Z., Liu, X.: Research on timed access of sensitive data based on dual encryption. J. Univ. Electr. Sci. Technol. China 46(3), 588–593 (2017)