Skip to main content
Erschienen in: Quantum Information Processing 1/2014

01.01.2014

A sessional blind signature based on quantum cryptography

verfasst von: Siavash Khodambashi, Ali Zakerolhosseini

Erschienen in: Quantum Information Processing | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chaum, D.: Blind signature for untraceable payments. Advances in cryptology, proceeding of CRYPTO’82, pp. 199–203. Springer, New York (1983) Chaum, D.: Blind signature for untraceable payments. Advances in cryptology, proceeding of CRYPTO’82, pp. 199–203. Springer, New York (1983)
2.
Zurück zum Zitat Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)CrossRef Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)CrossRef
3.
Zurück zum Zitat Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)CrossRef Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)CrossRef
4.
Zurück zum Zitat Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
5.
Zurück zum Zitat Bennett, C.H., DiVincenzo, D.P.: Quantum information and computation. Nature 404, 247–55 (2000)CrossRefADS Bennett, C.H., DiVincenzo, D.P.: Quantum information and computation. Nature 404, 247–55 (2000)CrossRefADS
7.
Zurück zum Zitat Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sinica (in Chinese) 29(8), 1098–1100 (2001) Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sinica (in Chinese) 29(8), 1098–1100 (2001)
9.
Zurück zum Zitat Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666–669 (2009) Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666–669 (2009)
10.
Zurück zum Zitat Naseri, M.: Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6(21), 5051–5053 (2011)MathSciNet Naseri, M.: Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6(21), 5051–5053 (2011)MathSciNet
11.
Zurück zum Zitat Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283, 4408–4410 (2010)CrossRefADS Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283, 4408–4410 (2010)CrossRefADS
12.
Zurück zum Zitat Ribordy, G.: Practical quantum key distribution systems based on faint laser pulses. LEOS summer topical meetings, pp. 28–29 (2006) Ribordy, G.: Practical quantum key distribution systems based on faint laser pulses. LEOS summer topical meetings, pp. 28–29 (2006)
13.
Zurück zum Zitat Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: SIGCOMM’03: Proceedings of the Conference on Apps., Tech., Arch., and Protocols for Comp. Commun., pp. 227–238, ACM Press, New York (2003) Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: SIGCOMM’03: Proceedings of the Conference on Apps., Tech., Arch., and Protocols for Comp. Commun., pp. 227–238, ACM Press, New York (2003)
14.
Zurück zum Zitat McMahon, D.: Quantum Computing Explained. Wiley, New Jersey (2008)MATH McMahon, D.: Quantum Computing Explained. Wiley, New Jersey (2008)MATH
15.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)CrossRefADS Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)CrossRefADS
16.
Zurück zum Zitat Grzywak, A., Kowalczyk, G.P.: Quantum cryptography. Theor. Appl. Inform. 21(3–4), 149–166 (2009) Grzywak, A., Kowalczyk, G.P.: Quantum cryptography. Theor. Appl. Inform. 21(3–4), 149–166 (2009)
17.
Zurück zum Zitat Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefADS Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)CrossRefADS
18.
Zurück zum Zitat Teja, V., Banerjee, P., Sharma, N.N., Mittal, R.K.: Quantum cryptography: state-of-art, challenges and future perspectives, pp. 1296–1301. IEEE Int. Conf. on Nanotechnology (2007) Teja, V., Banerjee, P., Sharma, N.N., Mittal, R.K.: Quantum cryptography: state-of-art, challenges and future perspectives, pp. 1296–1301. IEEE Int. Conf. on Nanotechnology (2007)
19.
Zurück zum Zitat Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), pp. 2325 (2006) Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), pp. 2325 (2006)
20.
Zurück zum Zitat Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against trojan horse attack. Quant. Phy. (2005) arXiv:quant-ph/0508168v1 Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against trojan horse attack. Quant. Phy. (2005) arXiv:quant-ph/0508168v1
21.
Zurück zum Zitat Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRefADS
Metadaten
Titel
A sessional blind signature based on quantum cryptography
verfasst von
Siavash Khodambashi
Ali Zakerolhosseini
Publikationsdatum
01.01.2014
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 1/2014
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0529-5

Weitere Artikel der Ausgabe 1/2014

Quantum Information Processing 1/2014 Zur Ausgabe

Neuer Inhalt