This is a demo service running based on a server with 3.5GHz Intel Xeon CPU (Ice Lake).
Decryption policy as follows: decryption is only allowed after a certain period of time; otherwise, it will be considered illegal decryption.

Encryption

Enter your unique ID (must be number), followed by the plaintext you wish to encrypt.

ID: Plaintext:

Decide on the duration after which the ciphertext can be decrypted.

Duration:

The ciphertext and quote can be shared and stored.

Ciphertext:

Decryption

To decipher the ciphertext, paste it into the following fields. The original plaintext will be revealed if the current time exceeds the protocol time defined in ciphertext. If attempted before this time, decryption will be rejected, but the operation will still be logged.

Ciphertext:
TEE quote:
Message:

Accountability of Decryption

Every decryption event is meticulously logged. This includes key information such as ID, SN, protocol time (the specified decryption time within the ciphertext), decrypt time (the actual time the decryption request was received), validity, along with the signature and proof. Here, when decrypt time exceeds protocol time, the decryption is Valid, otherwise it is Invalid.

The table will only display the latest 20 log entries.

ID SN Protocol Time Decrypt Time Validity Signature

We aim to guarantee data security and accountability in decryption operations. With a focus on transparency and a clear audit trail, our system offers a powerful solution for secure decryption while alerting against any suspicious decryption activities.