Skip to main content
Erschienen in: Quantum Information Processing 7/2015

01.07.2015

A novel quantum group signature scheme without using entangled states

verfasst von: Guang-Bao Xu, Ke-Jia Zhang

Erschienen in: Quantum Information Processing | Ausgabe 7/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chaum, D., Heyst, E.: Group signature. In: Advances in Cryptology Eurocrypt’91 LNCS, vol. 547, pp. 257–265. Springer, Berlin (1992) Chaum, D., Heyst, E.: Group signature. In: Advances in Cryptology Eurocrypt’91 LNCS, vol. 547, pp. 257–265. Springer, Berlin (1992)
2.
Zurück zum Zitat Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Advances in Cryptology-Crypo’97 LNCS, vol. 1296, pp. 410–424. Springer, Berlin (1997) Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Advances in Cryptology-Crypo’97 LNCS, vol. 1296, pp. 410–424. Springer, Berlin (1997)
3.
Zurück zum Zitat Bresson, E., Stem, J.: Efficient revocation in group signature. In: Proceedings of PKC’01 LNCS, vol. 1992, pp. 190–206. Springer, Berlin (2001) Bresson, E., Stem, J.: Efficient revocation in group signature. In: Proceedings of PKC’01 LNCS, vol. 1992, pp. 190–206. Springer, Berlin (2001)
4.
Zurück zum Zitat Ateniese, G., Camenisch, J., Joye, M.: A practical and provably secure coalition-resistant group signature scheme. In: Advances in Cryptology-Crypto’2000 LNCS, vol. 1880, pp. 255–270. Springer, Berlin (2000) Ateniese, G., Camenisch, J., Joye, M.: A practical and provably secure coalition-resistant group signature scheme. In: Advances in Cryptology-Crypto’2000 LNCS, vol. 1880, pp. 255–270. Springer, Berlin (2000)
5.
Zurück zum Zitat Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MATHMathSciNetCrossRef Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MATHMathSciNetCrossRef
7.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers. Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers. Systems and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)
10.
Zurück zum Zitat Wang, T.Y., Wen, Q.Y., Chen, X.B.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283, 5261–5263 (2010)ADSCrossRef Wang, T.Y., Wen, Q.Y., Chen, X.B.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283, 5261–5263 (2010)ADSCrossRef
11.
Zurück zum Zitat Salas, P.: Security of plug-and-play QKD arrangements with finite resources. Quantum Inf. Comput. 13, 861–869 (2013) Salas, P.: Security of plug-and-play QKD arrangements with finite resources. Quantum Inf. Comput. 13, 861–869 (2013)
12.
Zurück zum Zitat Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef
13.
Zurück zum Zitat Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef Boström, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)ADSCrossRef
14.
Zurück zum Zitat Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pairblock. Phys. Rev. A 68, 042317 (2003)ADSCrossRef Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pairblock. Phys. Rev. A 68, 042317 (2003)ADSCrossRef
15.
Zurück zum Zitat Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 10, 100308 (2012)CrossRef Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 10, 100308 (2012)CrossRef
16.
Zurück zum Zitat Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A 69, 052307 (2004)ADSCrossRef Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A 69, 052307 (2004)ADSCrossRef
17.
Zurück zum Zitat Hao, L., Wang, C., Long, G.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284, 3639–3642 (2011)ADSCrossRef Hao, L., Wang, C., Long, G.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284, 3639–3642 (2011)ADSCrossRef
18.
Zurück zum Zitat Tsai, C., Hwang, T.: Multi-party quantum secret sharing based on two special entangled states. Sci. China. Phys. Mech. Astron. 55, 460–464 (2012)ADSCrossRef Tsai, C., Hwang, T.: Multi-party quantum secret sharing based on two special entangled states. Sci. China. Phys. Mech. Astron. 55, 460–464 (2012)ADSCrossRef
19.
Zurück zum Zitat Massoud, H., Elham, F.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China Phys. Mech. Astron. 55, 1828–1831 (2012)ADSCrossRef Massoud, H., Elham, F.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China Phys. Mech. Astron. 55, 1828–1831 (2012)ADSCrossRef
20.
Zurück zum Zitat Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing theory through noisy channel. Quantum Inf. Comput. 12, 253–270 (2012)MATHMathSciNet Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing theory through noisy channel. Quantum Inf. Comput. 12, 253–270 (2012)MATHMathSciNet
21.
Zurück zum Zitat Qin, S.J., Gao, F., Wen, Q.Y., et al.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101–103 (2006)MATHADSCrossRef Qin, S.J., Gao, F., Wen, Q.Y., et al.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101–103 (2006)MATHADSCrossRef
22.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)MATHADSCrossRef Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)MATHADSCrossRef
23.
Zurück zum Zitat Liu, F., Qin, S.J., Wen, Q.Y.: A quantum secret sharing protocol with fairness. Phys. Scr. 89, 075104 (2014)ADSCrossRef Liu, F., Qin, S.J., Wen, Q.Y.: A quantum secret sharing protocol with fairness. Phys. Scr. 89, 075104 (2014)ADSCrossRef
24.
Zurück zum Zitat Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373–384 (2012)MATHMathSciNetCrossRef Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373–384 (2012)MATHMathSciNetCrossRef
25.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)MathSciNetADSCrossRef Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)MathSciNetADSCrossRef
26.
Zurück zum Zitat Liu, W., Wang, Y., Jiang, Z.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRef Liu, W., Wang, Y., Jiang, Z.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160–3163 (2011)ADSCrossRef
28.
Zurück zum Zitat Barnum, H., Crpeau. C., Gottesman, D., et al.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 449–459. IEEE, Washington (2002) Barnum, H., Crpeau. C., Gottesman, D., et al.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on the Foundations of Computer Science, pp. 449–459. IEEE, Washington (2002)
30.
Zurück zum Zitat Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415–418 (2008)ADSCrossRef Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415–418 (2008)ADSCrossRef
31.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chin. Ser. G 51, 1079–1088 (2008)MATHCrossRef Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chin. Ser. G 51, 1079–1088 (2008)MATHCrossRef
32.
Zurück zum Zitat Yang, Y., Wang, Y., Teng, Y., et al.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54, 84–88 (2010)MATHADSCrossRef Yang, Y., Wang, Y., Teng, Y., et al.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54, 84–88 (2010)MATHADSCrossRef
33.
34.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRef Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRef
35.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)ADSCrossRef
36.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)ADSCrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)ADSCrossRef
37.
Zurück zum Zitat Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12, 2655–2669 (2013)MATHMathSciNetADSCrossRef Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12, 2655–2669 (2013)MATHMathSciNetADSCrossRef
38.
Zurück zum Zitat Wen, X.J., Tian, Y., Ji, L.P., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)ADSCrossRef Wen, X.J., Tian, Y., Ji, L.P., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)ADSCrossRef
39.
Zurück zum Zitat Wen, X.J.: Quantum group blind signature scheme without entanglement. Phys. Scr. 82, 065403 (2010)CrossRef Wen, X.J.: Quantum group blind signature scheme without entanglement. Phys. Scr. 82, 065403 (2010)CrossRef
40.
Zurück zum Zitat Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654–3658 (2011)ADSCrossRef Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654–3658 (2011)ADSCrossRef
41.
Zurück zum Zitat Zhang, K.J., Song, T.T., Zuo, H.J., et al.: A secure quantum signature scheme based on Bell states. Phys. Scr. 87, 045012 (2013)ADSCrossRef Zhang, K.J., Song, T.T., Zuo, H.J., et al.: A secure quantum signature scheme based on Bell states. Phys. Scr. 87, 045012 (2013)ADSCrossRef
42.
Zurück zum Zitat Zhang, K.J., Sun, Y., Song, T.T., Zuo, H.J.: Cryptanalysis of the quantum group signature protocols. Int. J. Theor. Phys. 52, 4163–4173 (2013)MATHMathSciNetCrossRef Zhang, K.J., Sun, Y., Song, T.T., Zuo, H.J.: Cryptanalysis of the quantum group signature protocols. Int. J. Theor. Phys. 52, 4163–4173 (2013)MATHMathSciNetCrossRef
43.
Zurück zum Zitat Boykin, P., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)ADSCrossRef Boykin, P., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)ADSCrossRef
44.
Zurück zum Zitat Buhrman, H., Cleve, R., Watrous, J., et al.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)ADSCrossRef Buhrman, H., Cleve, R., Watrous, J., et al.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)ADSCrossRef
45.
Zurück zum Zitat Zhou, N., Zeng, G.H., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149–50 (2001)CrossRef Zhou, N., Zeng, G.H., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40, 1149–50 (2001)CrossRef
46.
Zurück zum Zitat Hsuch, C., Chen, C.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference, pp. 236–242. Taipei (2004) Hsuch, C., Chen, C.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference, pp. 236–242. Taipei (2004)
47.
Zurück zum Zitat Shi, R.H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12, 921–932 (2013)MATHMathSciNetADSCrossRef Shi, R.H., Zhong, H.: Multi-party quantum key agreement with bell states and bell measurements. Quantum Inf. Process. 12, 921–932 (2013)MATHMathSciNetADSCrossRef
48.
Zurück zum Zitat Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797–1805 (2013)MATHMathSciNetADSCrossRef Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797–1805 (2013)MATHMathSciNetADSCrossRef
49.
Zurück zum Zitat Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587–2594 (2014)MATHMathSciNetADSCrossRef Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J.: Novel multiparty quantum key agreement protocol with GHZ states. Quantum Inf. Process. 13, 2587–2594 (2014)MATHMathSciNetADSCrossRef
50.
Zurück zum Zitat Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADSCrossRef Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADSCrossRef
51.
Zurück zum Zitat Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “Quantum key distribution without alternative measurements”. Phys. Rev. A 63, 036301 (2001)MathSciNetADSCrossRef Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “Quantum key distribution without alternative measurements”. Phys. Rev. A 63, 036301 (2001)MathSciNetADSCrossRef
52.
Zurück zum Zitat Gao, F., Qin, Sj, Wen, Q.Y., et al.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7, 329–334 (2007)MATHMathSciNet Gao, F., Qin, Sj, Wen, Q.Y., et al.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7, 329–334 (2007)MATHMathSciNet
53.
Zurück zum Zitat Gao, F., Qin, S., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192–195 (2010)ADSCrossRef Gao, F., Qin, S., Wen, Q.Y., et al.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192–195 (2010)ADSCrossRef
54.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., et al.: Trojan-horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef Gisin, N., Fasel, S., Kraus, B., et al.: Trojan-horse attacks on quantum key distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef
55.
Zurück zum Zitat Deng, F.G., Li, X.H., Zhou, H.Y., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef Deng, F.G., Li, X.H., Zhou, H.Y., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef
Metadaten
Titel
A novel quantum group signature scheme without using entangled states
verfasst von
Guang-Bao Xu
Ke-Jia Zhang
Publikationsdatum
01.07.2015
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 7/2015
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-015-0995-z

Weitere Artikel der Ausgabe 7/2015

Quantum Information Processing 7/2015 Zur Ausgabe

Neuer Inhalt