Skip to main content
Erschienen in: Quantum Information Processing 3/2017

01.03.2017

An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

verfasst von: Long Zhang, Hong-Wei Sun, Ke-Jia Zhang, Heng-Yue Jia

Erschienen in: Quantum Information Processing | Ausgabe 3/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefMATH Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefMATH
2.
Zurück zum Zitat Grover, L.K.: A fast quantum mechanical algorithm for database search. quant-ph/9605043v3 (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. quant-ph/9605043v3 (1996)
3.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)ADSCrossRef
4.
Zurück zum Zitat Xin, L., Qiaoyan, W., Tingting, S., Zhang, J.: Quantum Steganography with high efficiency with noisy depolarizing channels. IEICE Trans. Fundam. E96–A(10), 2039–2044 (2013) Xin, L., Qiaoyan, W., Tingting, S., Zhang, J.: Quantum Steganography with high efficiency with noisy depolarizing channels. IEICE Trans. Fundam. E96–A(10), 2039–2044 (2013)
5.
Zurück zum Zitat Yang, Y.-G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(8), 2765–2769 (2013)ADSMathSciNetCrossRefMATH Yang, Y.-G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(8), 2765–2769 (2013)ADSMathSciNetCrossRefMATH
6.
7.
Zurück zum Zitat Song, X.-H., Wang, S., Liu, S., El-Latif, A.A.A., Niu, X.-M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12), 3689–3706 (2013)ADSMathSciNetCrossRefMATH Song, X.-H., Wang, S., Liu, S., El-Latif, A.A.A., Niu, X.-M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12), 3689–3706 (2013)ADSMathSciNetCrossRefMATH
8.
Zurück zum Zitat Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83(2), 022310 (2011)ADSCrossRef Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83(2), 022310 (2011)ADSCrossRef
9.
Zurück zum Zitat Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28(4), 21–27 (2015)CrossRef Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28(4), 21–27 (2015)CrossRef
10.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179. IEEE Press, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175–179. IEEE Press, New York (1984)
13.
Zurück zum Zitat Bennett, C.H., Brassard, G., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993)ADSMathSciNetCrossRefMATH Bennett, C.H., Brassard, G., et al.: Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70, 1895–1899 (1993)ADSMathSciNetCrossRefMATH
14.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)ADSCrossRefMATH Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)ADSCrossRefMATH
15.
Zurück zum Zitat Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648–651 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648–651 (1999)ADSCrossRef
17.
Zurück zum Zitat Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)ADSCrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)ADSCrossRef
18.
Zurück zum Zitat Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Proc. 12(1), 365–380 (2013)ADSMathSciNetCrossRefMATH Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Proc. 12(1), 365–380 (2013)ADSMathSciNetCrossRefMATH
19.
Zurück zum Zitat Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)ADSCrossRef
20.
Zurück zum Zitat Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRef Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRef
21.
Zurück zum Zitat Lin, S., Wen, Q.Y., Zhu, F.C.: Quantum secure direct communication with X-type entangled states. Phys. Rev. A 78, 064304 (2008)ADSCrossRef Lin, S., Wen, Q.Y., Zhu, F.C.: Quantum secure direct communication with X-type entangled states. Phys. Rev. A 78, 064304 (2008)ADSCrossRef
22.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “Experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef
23.
Zurück zum Zitat Chen, X.B., Yang, S., Xu, G., Su, Y., Yang, Y.X.: Cryptanalysis of the quantum state sharing protocol using four sets of \(W\)-class states. Int. J. Quantum Inf. 11(1), 1350010 (2013)MathSciNetCrossRefMATH Chen, X.B., Yang, S., Xu, G., Su, Y., Yang, Y.X.: Cryptanalysis of the quantum state sharing protocol using four sets of \(W\)-class states. Int. J. Quantum Inf. 11(1), 1350010 (2013)MathSciNetCrossRefMATH
24.
Zurück zum Zitat Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “Quantum key distribution without alternative measurements”. Phys. Rev. A 63, 036301 (2001)ADSCrossRef Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “Quantum key distribution without alternative measurements”. Phys. Rev. A 63, 036301 (2001)ADSCrossRef
25.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the bradler-dusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the bradler-dusek protocol. Quantum Inf. Comput. 7, 329 (2007)MathSciNetMATH
26.
Zurück zum Zitat Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17, 3189 (2008)ADSCrossRef Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17, 3189 (2008)ADSCrossRef
27.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47, 630 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47, 630 (2011)ADSCrossRef
28.
Zurück zum Zitat Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)ADSCrossRefMATH Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)ADSCrossRefMATH
29.
Zurück zum Zitat W’ojcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)ADSCrossRef W’ojcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)ADSCrossRef
31.
Zurück zum Zitat Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam”. Phys. Lett. A 360, 748 (2007)ADSCrossRef Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “Quantum exam”. Phys. Lett. A 360, 748 (2007)ADSCrossRef
32.
Zurück zum Zitat Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus \(N\)-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)ADSCrossRef Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus \(N\)-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)ADSCrossRef
33.
Zurück zum Zitat Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)ADSCrossRef Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)ADSCrossRef
34.
Zurück zum Zitat Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)ADSCrossRef Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)ADSCrossRef
35.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)ADSCrossRef Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)ADSCrossRef
36.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef
37.
Zurück zum Zitat Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef
38.
Zurück zum Zitat Chen, X.B., Yang, S., Su, Y., Yang, Y.X.: Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state. Phys. Scr. 86, 055002 (2012)ADSCrossRefMATH Chen, X.B., Yang, S., Su, Y., Yang, Y.X.: Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state. Phys. Scr. 86, 055002 (2012)ADSCrossRefMATH
39.
Zurück zum Zitat Gottesman, D., Chuang, I.: Quantum digital signatures. quant-ph/0105032v2 (2001) Gottesman, D., Chuang, I.: Quantum digital signatures. quant-ph/0105032v2 (2001)
40.
Zurück zum Zitat Buhrman, H., Cleve, R., Watrous, J., et al.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)ADSCrossRef Buhrman, H., Cleve, R., Watrous, J., et al.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)ADSCrossRef
41.
Zurück zum Zitat Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages. IEEE Computer Society Press, Washington, DC (2002). pp 449–458 Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages. IEEE Computer Society Press, Washington, DC (2002). pp 449–458
42.
Zurück zum Zitat Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)ADSCrossRef Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)ADSCrossRef
43.
44.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRef Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRef
45.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef
46.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)ADSCrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)ADSCrossRef
47.
Zurück zum Zitat Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRefMATH Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRefMATH
48.
Zurück zum Zitat Hwang, T., Luo, Y.P., Chong, S.K.: Comment on: “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85, 056301 (2012)ADSCrossRef Hwang, T., Luo, Y.P., Chong, S.K.: Comment on: “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85, 056301 (2012)ADSCrossRef
49.
Zurück zum Zitat Zhang, K.J., Qin, S.J., Sun, Y., et al.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRefMATH Zhang, K.J., Qin, S.J., Sun, Y., et al.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRefMATH
50.
Zurück zum Zitat Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetCrossRefMATH Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetCrossRefMATH
51.
Zurück zum Zitat Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. Preprint arXiv:1512.00711 (2015) Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. Preprint arXiv:​1512.​00711 (2015)
52.
Zurück zum Zitat Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRefMATH Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRefMATH
53.
Zurück zum Zitat Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28–38 (2014)MathSciNetCrossRefMATH Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28–38 (2014)MathSciNetCrossRefMATH
54.
Zurück zum Zitat Chao, W., Jian-Wei, L., Tao, S.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)CrossRef Chao, W., Jian-Wei, L., Tao, S.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)CrossRef
Metadaten
Titel
An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption
verfasst von
Long Zhang
Hong-Wei Sun
Ke-Jia Zhang
Heng-Yue Jia
Publikationsdatum
01.03.2017
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 3/2017
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1531-0

Weitere Artikel der Ausgabe 3/2017

Quantum Information Processing 3/2017 Zur Ausgabe

Neuer Inhalt