Skip to main content
Erschienen in: Quantum Information Processing 10/2018

01.10.2018

A high capacity quantum weak blind signature based on logistic chaotic maps

verfasst von: Xiaoping Lou, Wensheng Tang, Xiaoxiao Chen

Erschienen in: Quantum Information Processing | Ausgabe 10/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Motivated by the teleportation of hyper-entangled states, a high capacity quantum weak blind signature (QWBS) scheme is developed via logistic chaotic maps. Three participants jointly accomplish the task in two degrees of freedom entangled system process. Alice blinds the two copies of each state via a chaotic quantum blinding algorithm, using the initial keys shared by Bob. Charlie and Alice provide private and public signatures, while Bob verifies the authenticity by comparing both the blinded and original messages. Unlike previous schemes, the proposed QWBS scheme is immune to internal counterfeiting attacks that can be applied after signing. Analysis shows that the scheme ensures a blind signature while maintaining sender traceability with the help of a trusted signatory in the three-sided cooperative mechanism. This QWBS protocol has the advantage of having a higher capacity than the protocols with a qubit system. It has a wide application for online electronic transaction systems.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1983)MathSciNetCrossRef Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1983)MathSciNetCrossRef
2.
Zurück zum Zitat Nist, C.: The Digital Signature Standard, pp. 36–40. ACM, New York (1992) Nist, C.: The Digital Signature Standard, pp. 36–40. ACM, New York (1992)
3.
Zurück zum Zitat Meijer, H., Akl, S.: Digital signature schemes for computer communication networks. In: Symposium on Data Communications, pp. 37–41 (1981) Meijer, H., Akl, S.: Digital signature schemes for computer communication networks. In: Symposium on Data Communications, pp. 37–41 (1981)
4.
Zurück zum Zitat Chaum, D.: Blind Signatures for Untraceable Payments. Springer, Berlin (1983)CrossRef Chaum, D.: Blind Signatures for Untraceable Payments. Springer, Berlin (1983)CrossRef
5.
Zurück zum Zitat Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)CrossRef Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)CrossRef
6.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum Entanglement and Quantum Information—Proceedings of Cast, pp. 303–332 (1999)ADSMathSciNetCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum Entanglement and Quantum Information—Proceedings of Cast, pp. 303–332 (1999)ADSMathSciNetCrossRef
7.
Zurück zum Zitat Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings ACM Symposium on the Theory of Computing, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings ACM Symposium on the Theory of Computing, pp. 212–219 (1996)
8.
Zurück zum Zitat Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states. Phys. Rev. Lett. 69(20), 2881 (1992)ADSMathSciNetCrossRef Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states. Phys. Rev. Lett. 69(20), 2881 (1992)ADSMathSciNetCrossRef
9.
Zurück zum Zitat Zhou, N., Wang, L., Gong, L., Zuo, X., Liu, Y.: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)ADSCrossRef Zhou, N., Wang, L., Gong, L., Zuo, X., Liu, Y.: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)ADSCrossRef
10.
Zurück zum Zitat Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1), 365–380 (2013)ADSMathSciNetCrossRef Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1), 365–380 (2013)ADSMathSciNetCrossRef
11.
Zurück zum Zitat Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with \(\chi \)-type entangled states. Phys. Rev. A 78(6), 5175–5179 (2008)CrossRef Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with \(\chi \)-type entangled states. Phys. Rev. A 78(6), 5175–5179 (2008)CrossRef
12.
Zurück zum Zitat Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)ADSCrossRef Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)ADSCrossRef
13.
Zurück zum Zitat Wei, C.Y., Cai, X.Q., Liu, B., Wang, T., Gao, F.: A generic construction of quantum-oblivious-keytransfer-based private query with ideal data base security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef Wei, C.Y., Cai, X.Q., Liu, B., Wang, T., Gao, F.: A generic construction of quantum-oblivious-keytransfer-based private query with ideal data base security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef
14.
Zurück zum Zitat Wallden, P., Dunjko, V., Kent, A., Andersson, E.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2014)ADSCrossRef Wallden, P., Dunjko, V., Kent, A., Andersson, E.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2014)ADSCrossRef
15.
Zurück zum Zitat Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., Jeffers, J., Buller, G.S.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., Jeffers, J., Buller, G.S.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef
16.
Zurück zum Zitat Zhang, K.J., Qin, S.J., Sun, Y., Song, T.T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRef Zhang, K.J., Qin, S.J., Sun, Y., Song, T.T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRef
17.
Zurück zum Zitat Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRef Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRef
18.
Zurück zum Zitat Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef
19.
Zurück zum Zitat Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 21, 5051–5053 (2011) Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 21, 5051–5053 (2011)
20.
Zurück zum Zitat Qi, S., Zheng, H., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef Qi, S., Zheng, H., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef
21.
Zurück zum Zitat Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60,307–060,307 (2010)CrossRef Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60,307–060,307 (2010)CrossRef
22.
Zurück zum Zitat He, L.B., Huang, L.S., Wei, Y., Rui, X.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 63–66 (2012) He, L.B., Huang, L.S., Wei, Y., Rui, X.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 63–66 (2012)
23.
Zurück zum Zitat Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)CrossRef Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)CrossRef
24.
25.
Zurück zum Zitat Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54(4), 1325–1333 (2015)MathSciNetCrossRef Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54(4), 1325–1333 (2015)MathSciNetCrossRef
26.
Zurück zum Zitat Lou, X., Chen, Z., Guo, Y.: A weak quantum blind signature with entanglement permutation. Int. J. Theor. Phys. 54(9), 3283–3292 (2015)MathSciNetCrossRef Lou, X., Chen, Z., Guo, Y.: A weak quantum blind signature with entanglement permutation. Int. J. Theor. Phys. 54(9), 3283–3292 (2015)MathSciNetCrossRef
27.
Zurück zum Zitat Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRef Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRef
28.
Zurück zum Zitat Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56(2), 634–642 (2017)CrossRef Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56(2), 634–642 (2017)CrossRef
29.
Zurück zum Zitat Zhang, M., Li, H.: Weak blind quantum signature protocol based on entanglement swapping. Photon. Res. 3(6), 324 (2015)CrossRef Zhang, M., Li, H.: Weak blind quantum signature protocol based on entanglement swapping. Photon. Res. 3(6), 324 (2015)CrossRef
30.
Zurück zum Zitat Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15(10), 4283 (2016)ADSCrossRef Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15(10), 4283 (2016)ADSCrossRef
31.
Zurück zum Zitat Law, J.: Quantum computation and quantum information. Math. Struct. Comput. Sci. 17(6), 1115–1115 (2012)MathSciNet Law, J.: Quantum computation and quantum information. Math. Struct. Comput. Sci. 17(6), 1115–1115 (2012)MathSciNet
33.
Zurück zum Zitat Sheng, Y.B., Deng, F.G., Long, G.L.: Complete hyperentangled-bell-state analysis for quantum communication. Phys. Rev. A 82, 032318 (2011)ADSCrossRef Sheng, Y.B., Deng, F.G., Long, G.L.: Complete hyperentangled-bell-state analysis for quantum communication. Phys. Rev. A 82, 032318 (2011)ADSCrossRef
34.
Zurück zum Zitat Sheng, Y.B., Deng, F.G.: Deterministic entanglement purification and complete nonlocal bell-state analysis with hyperentanglement. Phys. Rev. A 81, 032307 (2010)ADSCrossRef Sheng, Y.B., Deng, F.G.: Deterministic entanglement purification and complete nonlocal bell-state analysis with hyperentanglement. Phys. Rev. A 81, 032307 (2010)ADSCrossRef
35.
Zurück zum Zitat Andersson, E., Curty, M., Jex, I.: Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74(2), 343–346 (2006)CrossRef Andersson, E., Curty, M., Jex, I.: Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74(2), 343–346 (2006)CrossRef
36.
Zurück zum Zitat Furusawa, A., Sorensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282(5389), 706 (1998)ADSCrossRef Furusawa, A., Sorensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282(5389), 706 (1998)ADSCrossRef
37.
Zurück zum Zitat Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52(11), 4174–4184 (2013)MathSciNetCrossRef Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52(11), 4174–4184 (2013)MathSciNetCrossRef
38.
Zurück zum Zitat Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRef Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRef
39.
Zurück zum Zitat Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)ADSCrossRef
41.
Zurück zum Zitat Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)ADSCrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)ADSCrossRef
42.
Zurück zum Zitat Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef
43.
Zurück zum Zitat Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef
44.
Zurück zum Zitat Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(04), 553–573 (2008)CrossRef Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(04), 553–573 (2008)CrossRef
45.
Zurück zum Zitat Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using bell states. Phys. Rev. A 79(5), 1744–1747 (2009)MathSciNet Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using bell states. Phys. Rev. A 79(5), 1744–1747 (2009)MathSciNet
46.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 14717–14719 (2011)CrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 14717–14719 (2011)CrossRef
Metadaten
Titel
A high capacity quantum weak blind signature based on logistic chaotic maps
verfasst von
Xiaoping Lou
Wensheng Tang
Xiaoxiao Chen
Publikationsdatum
01.10.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 10/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2014-7

Weitere Artikel der Ausgabe 10/2018

Quantum Information Processing 10/2018 Zur Ausgabe

Neuer Inhalt