Skip to main content
Top
Published in: Quantum Information Processing 10/2018

01-10-2018

A high capacity quantum weak blind signature based on logistic chaotic maps

Authors: Xiaoping Lou, Wensheng Tang, Xiaoxiao Chen

Published in: Quantum Information Processing | Issue 10/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Motivated by the teleportation of hyper-entangled states, a high capacity quantum weak blind signature (QWBS) scheme is developed via logistic chaotic maps. Three participants jointly accomplish the task in two degrees of freedom entangled system process. Alice blinds the two copies of each state via a chaotic quantum blinding algorithm, using the initial keys shared by Bob. Charlie and Alice provide private and public signatures, while Bob verifies the authenticity by comparing both the blinded and original messages. Unlike previous schemes, the proposed QWBS scheme is immune to internal counterfeiting attacks that can be applied after signing. Analysis shows that the scheme ensures a blind signature while maintaining sender traceability with the help of a trusted signatory in the three-sided cooperative mechanism. This QWBS protocol has the advantage of having a higher capacity than the protocols with a qubit system. It has a wide application for online electronic transaction systems.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1983)MathSciNetCrossRef Rivest, R.L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 26(2), 96–99 (1983)MathSciNetCrossRef
2.
go back to reference Nist, C.: The Digital Signature Standard, pp. 36–40. ACM, New York (1992) Nist, C.: The Digital Signature Standard, pp. 36–40. ACM, New York (1992)
3.
go back to reference Meijer, H., Akl, S.: Digital signature schemes for computer communication networks. In: Symposium on Data Communications, pp. 37–41 (1981) Meijer, H., Akl, S.: Digital signature schemes for computer communication networks. In: Symposium on Data Communications, pp. 37–41 (1981)
4.
go back to reference Chaum, D.: Blind Signatures for Untraceable Payments. Springer, Berlin (1983)CrossRef Chaum, D.: Blind Signatures for Untraceable Payments. Springer, Berlin (1983)CrossRef
5.
go back to reference Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)CrossRef Pointcheval, D., Stern, J.: Security arguments for digital signatures and blind signatures. J. Cryptol. 13(3), 361–396 (2000)CrossRef
6.
go back to reference Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum Entanglement and Quantum Information—Proceedings of Cast, pp. 303–332 (1999)ADSMathSciNetCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum Entanglement and Quantum Information—Proceedings of Cast, pp. 303–332 (1999)ADSMathSciNetCrossRef
7.
go back to reference Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings ACM Symposium on the Theory of Computing, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings ACM Symposium on the Theory of Computing, pp. 212–219 (1996)
8.
go back to reference Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states. Phys. Rev. Lett. 69(20), 2881 (1992)ADSMathSciNetCrossRef Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein–Podolsky–Rosen states. Phys. Rev. Lett. 69(20), 2881 (1992)ADSMathSciNetCrossRef
9.
go back to reference Zhou, N., Wang, L., Gong, L., Zuo, X., Liu, Y.: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)ADSCrossRef Zhou, N., Wang, L., Gong, L., Zuo, X., Liu, Y.: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836–4842 (2011)ADSCrossRef
10.
go back to reference Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1), 365–380 (2013)ADSMathSciNetCrossRef Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1), 365–380 (2013)ADSMathSciNetCrossRef
11.
go back to reference Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with \(\chi \)-type entangled states. Phys. Rev. A 78(6), 5175–5179 (2008)CrossRef Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with \(\chi \)-type entangled states. Phys. Rev. A 78(6), 5175–5179 (2008)CrossRef
12.
go back to reference Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)ADSCrossRef Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)ADSCrossRef
13.
go back to reference Wei, C.Y., Cai, X.Q., Liu, B., Wang, T., Gao, F.: A generic construction of quantum-oblivious-keytransfer-based private query with ideal data base security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef Wei, C.Y., Cai, X.Q., Liu, B., Wang, T., Gao, F.: A generic construction of quantum-oblivious-keytransfer-based private query with ideal data base security and zero failure. IEEE Trans. Comput. 67(1), 2–8 (2018)MathSciNetCrossRef
14.
go back to reference Wallden, P., Dunjko, V., Kent, A., Andersson, E.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2014)ADSCrossRef Wallden, P., Dunjko, V., Kent, A., Andersson, E.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2014)ADSCrossRef
15.
go back to reference Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., Jeffers, J., Buller, G.S.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., Jeffers, J., Buller, G.S.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef
16.
go back to reference Zhang, K.J., Qin, S.J., Sun, Y., Song, T.T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRef Zhang, K.J., Qin, S.J., Sun, Y., Song, T.T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127–3141 (2013)ADSMathSciNetCrossRef
17.
go back to reference Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRef Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetCrossRef
18.
go back to reference Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef
19.
go back to reference Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 21, 5051–5053 (2011) Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 21, 5051–5053 (2011)
20.
go back to reference Qi, S., Zheng, H., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef Qi, S., Zheng, H., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef
21.
go back to reference Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60,307–060,307 (2010)CrossRef Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60,307–060,307 (2010)CrossRef
22.
go back to reference He, L.B., Huang, L.S., Wei, Y., Rui, X.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 63–66 (2012) He, L.B., Huang, L.S., Wei, Y., Rui, X.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 63–66 (2012)
23.
go back to reference Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)CrossRef Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)CrossRef
25.
go back to reference Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54(4), 1325–1333 (2015)MathSciNetCrossRef Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54(4), 1325–1333 (2015)MathSciNetCrossRef
26.
go back to reference Lou, X., Chen, Z., Guo, Y.: A weak quantum blind signature with entanglement permutation. Int. J. Theor. Phys. 54(9), 3283–3292 (2015)MathSciNetCrossRef Lou, X., Chen, Z., Guo, Y.: A weak quantum blind signature with entanglement permutation. Int. J. Theor. Phys. 54(9), 3283–3292 (2015)MathSciNetCrossRef
27.
go back to reference Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRef Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582–588 (2015)MathSciNetCrossRef
28.
go back to reference Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56(2), 634–642 (2017)CrossRef Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56(2), 634–642 (2017)CrossRef
29.
go back to reference Zhang, M., Li, H.: Weak blind quantum signature protocol based on entanglement swapping. Photon. Res. 3(6), 324 (2015)CrossRef Zhang, M., Li, H.: Weak blind quantum signature protocol based on entanglement swapping. Photon. Res. 3(6), 324 (2015)CrossRef
30.
go back to reference Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15(10), 4283 (2016)ADSCrossRef Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15(10), 4283 (2016)ADSCrossRef
31.
go back to reference Law, J.: Quantum computation and quantum information. Math. Struct. Comput. Sci. 17(6), 1115–1115 (2012)MathSciNet Law, J.: Quantum computation and quantum information. Math. Struct. Comput. Sci. 17(6), 1115–1115 (2012)MathSciNet
33.
go back to reference Sheng, Y.B., Deng, F.G., Long, G.L.: Complete hyperentangled-bell-state analysis for quantum communication. Phys. Rev. A 82, 032318 (2011)ADSCrossRef Sheng, Y.B., Deng, F.G., Long, G.L.: Complete hyperentangled-bell-state analysis for quantum communication. Phys. Rev. A 82, 032318 (2011)ADSCrossRef
34.
go back to reference Sheng, Y.B., Deng, F.G.: Deterministic entanglement purification and complete nonlocal bell-state analysis with hyperentanglement. Phys. Rev. A 81, 032307 (2010)ADSCrossRef Sheng, Y.B., Deng, F.G.: Deterministic entanglement purification and complete nonlocal bell-state analysis with hyperentanglement. Phys. Rev. A 81, 032307 (2010)ADSCrossRef
35.
go back to reference Andersson, E., Curty, M., Jex, I.: Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74(2), 343–346 (2006)CrossRef Andersson, E., Curty, M., Jex, I.: Experimentally realizable quantum comparison of coherent states and its applications. Phys. Rev. A 74(2), 343–346 (2006)CrossRef
36.
go back to reference Furusawa, A., Sorensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282(5389), 706 (1998)ADSCrossRef Furusawa, A., Sorensen, J.L., Braunstein, S.L., Fuchs, C.A., Kimble, H.J., Polzik, E.S.: Unconditional quantum teleportation. Science 282(5389), 706 (1998)ADSCrossRef
37.
go back to reference Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52(11), 4174–4184 (2013)MathSciNetCrossRef Zhou, N.R., Song, H.C., Gong, L.H.: Continuous variable quantum secret sharing via quantum teleportation. Int. J. Theor. Phys. 52(11), 4174–4184 (2013)MathSciNetCrossRef
38.
go back to reference Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRef Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRef
39.
go back to reference Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)ADSCrossRef Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648–651 (1999)ADSCrossRef
41.
go back to reference Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)ADSCrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)ADSCrossRef
42.
go back to reference Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)ADSCrossRef
43.
go back to reference Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef
44.
go back to reference Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(04), 553–573 (2008)CrossRef Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(04), 553–573 (2008)CrossRef
45.
go back to reference Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using bell states. Phys. Rev. A 79(5), 1744–1747 (2009)MathSciNet Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using bell states. Phys. Rev. A 79(5), 1744–1747 (2009)MathSciNet
46.
go back to reference Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 14717–14719 (2011)CrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 14717–14719 (2011)CrossRef
Metadata
Title
A high capacity quantum weak blind signature based on logistic chaotic maps
Authors
Xiaoping Lou
Wensheng Tang
Xiaoxiao Chen
Publication date
01-10-2018
Publisher
Springer US
Published in
Quantum Information Processing / Issue 10/2018
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2014-7

Other articles of this Issue 10/2018

Quantum Information Processing 10/2018 Go to the issue