Skip to main content
Erschienen in: Quantum Information Processing 5/2019

01.05.2019

Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes

verfasst von: Feng-Lin Chen, Li-Hua Zhang, Hai Zhang

Erschienen in: Quantum Information Processing | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The quantum one-time pad (QOTP) usually serves as the quantum encryption to encrypt quantum messages in arbitrated quantum signature (AQS) schemes. The original QOTP is a qubit-by-qubit encryption algorithm with message and encrypted signature always appearing in pair in AQS, which will lead to the vulnerability of the AQS scheme. By comparing the two quantum state pairs in AQS with the C-SWAP attack, it is possible for the attacker to obtain the signer’s key, which leads to the security weakness of AQS. Accordingly, we propose a new attack on AQS scheme for the first time. In order to deal with the attack on AQS scheme, QOTP must be replaced by an improved quantum encryption scheme. Based on QOTP with confusion, we proposed an improved quantum encryption scheme which can resist the attack in AQS scheme. Security analysis shows that the improved quantum encryption scheme works efficiently and securely.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Crandall, R., Pomerance, C.: Chapter 5, Prime Numbers: A Computational Perspective, 2nd edn. Springer, Berlin (2005)MATH Crandall, R., Pomerance, C.: Chapter 5, Prime Numbers: A Computational Perspective, 2nd edn. Springer, Berlin (2005)MATH
2.
Zurück zum Zitat Grover, L.K.: A fast quantum mechanical algorithm for estimating the median. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for estimating the median. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 212–219 (1996)
3.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATHCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATHCrossRef
4.
Zurück zum Zitat Schmidt, A., Vollmer, U.: Polynomial time quantum algorithm for the computation of the unit group of a number field. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 475–480 (2005) Schmidt, A., Vollmer, U.: Polynomial time quantum algorithm for the computation of the unit group of a number field. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 475–480 (2005)
5.
Zurück zum Zitat Hallgren, S.: Fast quantum algorithms for computing the unit group and class group of a number fields. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 468–474 (2005) Hallgren, S.: Fast quantum algorithms for computing the unit group and class group of a number fields. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 468–474 (2005)
7.
Zurück zum Zitat Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International (1979) Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International (1979)
8.
Zurück zum Zitat Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADSCrossRef Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADSCrossRef
9.
Zurück zum Zitat Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef
10.
Zurück zum Zitat Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADSCrossRef Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADSCrossRef
11.
Zurück zum Zitat Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADSCrossRef Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADSCrossRef
12.
Zurück zum Zitat Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef
13.
14.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010)CrossRef Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010)CrossRef
15.
Zurück zum Zitat Lee, H., Hong, C.H., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)ADSMathSciNetMATHCrossRef Lee, H., Hong, C.H., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)ADSMathSciNetMATHCrossRef
16.
Zurück zum Zitat Lu, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Zhang, J., He, J.H., Fu, Y. (eds.) Lecture Notes in Computer Science, vol. 3314, pp. 1054–1060. Springer, Berlin (2004) Lu, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Zhang, J., He, J.H., Fu, Y. (eds.) Lecture Notes in Computer Science, vol. 3314, pp. 1054–1060. Springer, Berlin (2004)
17.
Zurück zum Zitat Lu, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The International Conference on Advanced Communication Technology, vol. 1, pp. 514–517. IEEE (2004) Lu, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The International Conference on Advanced Communication Technology, vol. 1, pp. 514–517. IEEE (2004)
18.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)ADSCrossRef Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)ADSCrossRef
19.
Zurück zum Zitat Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(19), 3830 (2010)ADSCrossRef Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(19), 3830 (2010)ADSCrossRef
20.
Zurück zum Zitat Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2013)ADSCrossRef Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2013)ADSCrossRef
21.
Zurück zum Zitat Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773–778 (2011)ADSCrossRef Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773–778 (2011)ADSCrossRef
22.
Zurück zum Zitat Zou, X.F., Qiu, D.W., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATHCrossRef Zou, X.F., Qiu, D.W., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATHCrossRef
23.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef
24.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef
25.
Zurück zum Zitat Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetMATHCrossRef Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetMATHCrossRef
26.
Zurück zum Zitat Zhang, K.J., Li, D., Su, Q.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 169–174 (2014) Zhang, K.J., Li, D., Su, Q.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 169–174 (2014)
27.
Zurück zum Zitat Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetMATHCrossRef Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetMATHCrossRef
28.
Zurück zum Zitat Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 1–15 (2017)ADSMathSciNetMATHCrossRef Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 1–15 (2017)ADSMathSciNetMATHCrossRef
29.
Zurück zum Zitat Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADSCrossRef Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADSCrossRef
30.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Arbitrated quantum signature schemes: attacks and security. In: Fellows, M., Tan, X., Zhu, B. (eds.) FAW-AAIM 2013. LNCS, vol. 7924, pp. 48–59. Springer, Berlin (2013) Zou, X.F., Qiu, D.W.: Arbitrated quantum signature schemes: attacks and security. In: Fellows, M., Tan, X., Zhu, B. (eds.) FAW-AAIM 2013. LNCS, vol. 7924, pp. 48–59. Springer, Berlin (2013)
31.
Zurück zum Zitat Hwang, T., Luo, Y.P., Chong, S.K.: Comment on “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85(5), 056301 (2012)ADSCrossRef Hwang, T., Luo, Y.P., Chong, S.K.: Comment on “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85(5), 056301 (2012)ADSCrossRef
32.
Zurück zum Zitat Sun, Z.W., Du, R.G., Wang, B.H., Long, D.Y.: Improving the security of arbitrated quantum signature protocols. arXiv:1107.2459 [quant-ph] (2011) Sun, Z.W., Du, R.G., Wang, B.H., Long, D.Y.: Improving the security of arbitrated quantum signature protocols. arXiv:​1107.​2459 [quant-ph] (2011)
33.
Zurück zum Zitat Zhang, W., Qiu, D.W., Zou, X.F., Mateus, P.: Cryptanalysis of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement. Quantum Inf. Process. 16(6), 150 (2017)ADSMATHCrossRef Zhang, W., Qiu, D.W., Zou, X.F., Mateus, P.: Cryptanalysis of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement. Quantum Inf. Process. 16(6), 150 (2017)ADSMATHCrossRef
34.
35.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Attacks and improvements of QSDC schemes based on CSS codes. In: Lecture Notes in Artificial Intelligence, ICIC2011, vol. 6215, pp. 239–246 (2011)CrossRef Zou, X.F., Qiu, D.W.: Attacks and improvements of QSDC schemes based on CSS codes. In: Lecture Notes in Artificial Intelligence, ICIC2011, vol. 6215, pp. 239–246 (2011)CrossRef
36.
Zurück zum Zitat Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003)CrossRef Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003)CrossRef
37.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179 (1984)
39.
Zurück zum Zitat Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADSCrossRef Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADSCrossRef
40.
Zurück zum Zitat Gisin, N., Ribordy, G., Tillel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2001)ADSMATHCrossRef Gisin, N., Ribordy, G., Tillel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2001)ADSMATHCrossRef
41.
Zurück zum Zitat Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1), 23–25 (2006)ADSMATHCrossRef Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1), 23–25 (2006)ADSMATHCrossRef
42.
Zurück zum Zitat Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:quant-ph/0508168 (2005) Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:​quant-ph/​0508168 (2005)
44.
Zurück zum Zitat Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. arXiv:1512.00711 [quant-ph] (2015) Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. arXiv:​1512.​00711 [quant-ph] (2015)
Metadaten
Titel
Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes
verfasst von
Feng-Lin Chen
Li-Hua Zhang
Hai Zhang
Publikationsdatum
01.05.2019
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 5/2019
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-019-2265-y

Weitere Artikel der Ausgabe 5/2019

Quantum Information Processing 5/2019 Zur Ausgabe

Neuer Inhalt