时间门限代理签名方案
Time-Bound Threshold Proxy Signature Scheme
DOI: 10.12677/csa.2025.154096, PDF,   
作者: 孙芳芳, 岳笑含:沈阳工业大学信息科学与工程学院,辽宁 沈阳
关键词: 时间锁谜题门限签名代理签名Time-Lock Puzzles Threshold Signatures Proxy Signature
摘要: 随着当前加密货币行业的发展,安全数字签名的必要性也成比例地增长。数字签名能够有效提高工作效率,降低交易成本,提升信息安全,因此在全球范围内得到了广泛的应用。数字签名是一种基于公钥密码学的技术,用于确认数字信息的完整性、身份认证和防伪造性。传统数字签名技术在应对多方协作、时间敏感任务等复杂场景时存在显著局限性,难以满足现代分布式系统对安全性、效率与灵活性的高要求。为此,研究者结合定时密码学与分布式签名技术,提出了基于时间锁谜题的门限代理签名方案。
Abstract: With the current development of the cryptocurrency industry, the necessity of secure digital signatures has grown proportionally. Digital signatures can effectively enhance work efficiency, reduce transaction costs, and improve information security, thus being widely applied globally. Digital signatures are a technology based on public key cryptography, used to confirm the integrity of digital information, authenticate identities, and prevent forgery. Traditional digital signature technologies have significant limitations when dealing with complex scenarios such as multi-party collaboration and time-sensitive tasks, and are difficult to meet the high requirements of modern distributed systems for security, efficiency, and flexibility. Therefore, researchers have combined timed cryptography and distributed signature technology to propose a threshold proxy signature scheme based on time-lock puzzles.
文章引用:孙芳芳, 岳笑含. 时间门限代理签名方案[J]. 计算机科学与应用, 2025, 15(4): 247-251. https://doi.org/10.12677/csa.2025.154096

参考文献

[1] Rivest, R.L., Shamir, A. and Wagner, D.A. (1996) Time-Lock Puzzles and Timed-Release Crypto.
[2] Boneh, D. and Naor, M. (2000) Timed Commitments. In: Lecture Notes in Computer Science, Springer, 236-254. [Google Scholar] [CrossRef
[3] Boneh, D. and Komlo, C. (2022) Threshold Signatures with Private Accountability. In: Lecture Notes in Computer Science, Springer, 551-581. [Google Scholar] [CrossRef
[4] Shoup, V. (2000) Practical Threshold Signatures. Advances in CryptologyEUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, 14-18 May 2000, 207-220.
[5] Desmedt, Y. and Frankel, Y. (1991) Shared Generation of Authenticators and Signatures. In: Lecture Notes in Computer Science, Springer, 457-469. [Google Scholar] [CrossRef
[6] Yu, J. and Zhang, J. (2022) Quantum (t, n) Threshold Proxy Blind Signature Scheme Based on Bell States. International Journal of Theoretical Physics, 61, Article No. 207. [Google Scholar] [CrossRef
[7] Tang, F., Xu, T., Peng, J. and Gan, N. (2024) TP-PBFT: A Scalable PBFT Based on Threshold Proxy Signature for IoT-Blockchain Applications. IEEE Internet of Things Journal, 11, 15434-15449. [Google Scholar] [CrossRef
[8] Hsu, C., Wu, T. and Wu, T. (2001) New Nonrepudiable Threshold Proxy Signature Scheme with Known Signers. Journal of Systems and Software, 58, 119-124. [Google Scholar] [CrossRef
[9] Hwang, M.S., Lu, E.J. and Lin, I.-C. (2003) A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. IEEE Transactions on Knowledge and Data Engineering, 15, 1552-1560. [Google Scholar] [CrossRef
[10] Damgård, I.B. (1995) Practical and Provably Secure Release of a Secret and Exchange of Signatures. Journal of Cryptology, 8, 201-222. [Google Scholar] [CrossRef
[11] Garay, J.A. and Pomerance, C. (2003) Timed Fair Exchange of Standard Signatures. In: Lecture Notes in Computer Science, Springer, 190-207. [Google Scholar] [CrossRef