Skip to main content
Erschienen in: Quantum Information Processing 9/2014

01.09.2014

Cryptanalysis of a sessional blind signature based on quantum cryptography

verfasst von: Qi Su, Wen-Min Li

Erschienen in: Quantum Information Processing | Ausgabe 9/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A blind signature is a form of digital signature in which the content of a message is disguised (blinded) before it is signed to protect the privacy of the message from the signatory. For signing quantum messages, some quantum blind signature protocols have been proposed. Recently, Khodambashi et al. (Quantum Inf Process 13:121, 2014) proposed a sessional blind signature based on quantum cryptography. It was claimed that these protocol could guarantee unconditional security. However, after our analysis, we find that the signature protocol will cause the key information leakage in the view of information theory. Taking advantage of loophole, the message sender can succeed in forging the signature without the knowledge of the whole exact key between the verifier and him. To conquer this shortcoming, we construct an improved protocol based on it and the new protocol can resist the key information leakage attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984), pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984), pp. 175–179 (1984)
2.
Zurück zum Zitat Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1098 (2001) (in Chinese) Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1098 (2001) (in Chinese)
5.
Zurück zum Zitat Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295 (2004)MathSciNetCrossRefADSMATH Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295 (2004)MathSciNetCrossRefADSMATH
6.
8.
9.
Zurück zum Zitat Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)CrossRefADS Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)CrossRefADS
10.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS
11.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)CrossRefADS Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)CrossRefADS
12.
Zurück zum Zitat Wen, X.: An e-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH Wen, X.: An e-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH
13.
Zurück zum Zitat Wen, X., Chen, Y., Fang, J.: An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549 (2013)MathSciNetCrossRefADSMATH Wen, X., Chen, Y., Fang, J.: An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549 (2013)MathSciNetCrossRefADSMATH
14.
Zurück zum Zitat Wen, X., Nie, Z.: An e-payment system based on quantum blind and group signature. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 50–55 (2010) Wen, X., Nie, Z.: An e-payment system based on quantum blind and group signature. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 50–55 (2010)
15.
Zurück zum Zitat Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651 (2013)MathSciNetCrossRefADSMATH Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651 (2013)MathSciNetCrossRefADSMATH
16.
Zurück zum Zitat Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)MathSciNetCrossRefMATH Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)MathSciNetCrossRefMATH
17.
Zurück zum Zitat Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666 (2009)CrossRefADS Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666 (2009)CrossRefADS
18.
Zurück zum Zitat Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408 (2010)CrossRefADS Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408 (2010)CrossRefADS
19.
Zurück zum Zitat Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86(5), 055006 (2012)CrossRefMATH Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86(5), 055006 (2012)CrossRefMATH
20.
Zurück zum Zitat Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)CrossRefADS Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)CrossRefADS
21.
Zurück zum Zitat Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)CrossRefADS Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)CrossRefADS
22.
Zurück zum Zitat Shi, J., Shi, R., Guo, Y., Peng, X., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56(5), 1 (2013)MathSciNetCrossRef Shi, J., Shi, R., Guo, Y., Peng, X., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56(5), 1 (2013)MathSciNetCrossRef
23.
Zurück zum Zitat Shi, J., Shi, R., Tang, Y., Lee, M.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum fourier transform. Quantum Inf. Process. 10(5), 653 (2011)MathSciNetCrossRefMATH Shi, J., Shi, R., Tang, Y., Lee, M.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum fourier transform. Quantum Inf. Process. 10(5), 653 (2011)MathSciNetCrossRefMATH
24.
Zurück zum Zitat Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M., Park, D.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum fourier transform. Int. J. Theor. Phys. 51, 1038 (2012)CrossRefMATH Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M., Park, D.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum fourier transform. Int. J. Theor. Phys. 51, 1038 (2012)CrossRefMATH
25.
Zurück zum Zitat Shi, R., Shi, J., Guo, Y., Lee, M.H.: Multiparty quantum group signature scheme with quantum parallel computation. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 905–910 (2011) Shi, R., Shi, J., Guo, Y., Lee, M.H.: Multiparty quantum group signature scheme with quantum parallel computation. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 905–910 (2011)
26.
Zurück zum Zitat Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41 (2005)MathSciNetMATH Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41 (2005)MathSciNetMATH
27.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS
28.
Zurück zum Zitat Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [phys. rev. a 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [phys. rev. a 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS
29.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH
30.
Zurück zum Zitat Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)CrossRefADS
31.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630 (2011)CrossRefADS
32.
Zurück zum Zitat Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53, 491 (2010)CrossRefADS Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53, 491 (2010)CrossRefADS
33.
Zurück zum Zitat Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101 (2006)CrossRefADSMATH Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101 (2006)CrossRefADSMATH
34.
Zurück zum Zitat Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS
35.
Zurück zum Zitat Wójcik, A.: Comment on “quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)CrossRefADS Wójcik, A.: Comment on “quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)CrossRefADS
36.
Zurück zum Zitat Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS
37.
Zurück zum Zitat Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)CrossRefADS
38.
Zurück zum Zitat Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [phys. lett. a 350 (2006) 174]. Phys. Lett. A 360(6), 748 (2007)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [phys. lett. a 350 (2006) 174]. Phys. Lett. A 360(6), 748 (2007)CrossRefADS
39.
Zurück zum Zitat Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS
40.
Zurück zum Zitat Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192 (2010)CrossRefADS Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192 (2010)CrossRefADS
41.
Zurück zum Zitat Huang, W., Zuo, H.J., Li, Y.B.: Cryptanalysis and improvement of a multi-user quantum communication network using \(\chi \)-type entangled states. Int. J. Theor. Phys. 52(4), 1354 (2013)MathSciNetCrossRefMATH Huang, W., Zuo, H.J., Li, Y.B.: Cryptanalysis and improvement of a multi-user quantum communication network using \(\chi \)-type entangled states. Int. J. Theor. Phys. 52(4), 1354 (2013)MathSciNetCrossRefMATH
42.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS
43.
Zurück zum Zitat Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS
44.
Zurück zum Zitat Gao, F., Guo, F., Wen, Q., Zhu, F.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559 (2008)CrossRefADS Gao, F., Guo, F., Wen, Q., Zhu, F.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559 (2008)CrossRefADS
45.
Zurück zum Zitat Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121 (2014)CrossRefADSMathSciNet Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121 (2014)CrossRefADSMathSciNet
46.
Zurück zum Zitat Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two bell states and the shared secret bell state. Phys. Scr. 89(1), 015103 (2014)CrossRefADS Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two bell states and the shared secret bell state. Phys. Scr. 89(1), 015103 (2014)CrossRefADS
47.
Zurück zum Zitat Zhou, N.R., Wu, G.T., Gong, L.H., Liu, S.Q.: Secure quantum dialogue protocol based on W states without information leakage. Int. J. Theor. Phys. 52(9), 3204 (2013)MathSciNetCrossRefMATH Zhou, N.R., Wu, G.T., Gong, L.H., Liu, S.Q.: Secure quantum dialogue protocol based on W states without information leakage. Int. J. Theor. Phys. 52(9), 3204 (2013)MathSciNetCrossRefMATH
48.
Zurück zum Zitat Wang, L.Y., Chen, X.B., Xu, G., Yang, Y.X.: Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs. Opt. Commun. 284(7), 1719 (2011)CrossRefADS Wang, L.Y., Chen, X.B., Xu, G., Yang, Y.X.: Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs. Opt. Commun. 284(7), 1719 (2011)CrossRefADS
49.
Zurück zum Zitat Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace bb84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)CrossRefADS Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace bb84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)CrossRefADS
50.
Zurück zum Zitat Zanardi, P., Rasetti, M.: Noiseless quantum codes. Phys. Rev. Lett. 79, 3306 (1997)CrossRefADS Zanardi, P., Rasetti, M.: Noiseless quantum codes. Phys. Rev. Lett. 79, 3306 (1997)CrossRefADS
51.
Zurück zum Zitat Huang, W., Guo, F.Z., Huang, Z., Wen, Q.Y., Zhu, F.C.: Three-particle QKD protocol against a collective noise. Opt. Commun. 284(1), 536 (2011)CrossRefADS Huang, W., Guo, F.Z., Huang, Z., Wen, Q.Y., Zhu, F.C.: Three-particle QKD protocol against a collective noise. Opt. Commun. 284(1), 536 (2011)CrossRefADS
52.
Zurück zum Zitat Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)CrossRefADS Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)CrossRefADS
53.
Zurück zum Zitat Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100308 (2012)CrossRefADS Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100308 (2012)CrossRefADS
Metadaten
Titel
Cryptanalysis of a sessional blind signature based on quantum cryptography
verfasst von
Qi Su
Wen-Min Li
Publikationsdatum
01.09.2014
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 9/2014
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-014-0778-y

Weitere Artikel der Ausgabe 9/2014

Quantum Information Processing 9/2014 Zur Ausgabe

Neuer Inhalt