Skip to main content
Top
Published in: Wireless Personal Communications 2/2021

06-05-2021

A New Secure Quantum Signature Masked Authentication Scheme

Authors: Vandani Verma, Kajal Malhotra

Published in: Wireless Personal Communications | Issue 2/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

This paper proposes a new way of Quantum signature masked authentication, in which both user and certifying authority is needed for generating final signature. Our scheme uses decoy particle to protect key from all the attacks in the transmission process and does not require encryption of each key. The paper also shows that our scheme is protected against impersonation, forgery and outside attack and is more efficient than the other masked schemes existing in quantum cryptography.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing, Bangalore, India (pp 175–179). Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing, Bangalore, India (pp 175–179).
2.
3.
go back to reference Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states. Physical Review Letters, 68(21), 3121–3124MathSciNetCrossRef Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states. Physical Review Letters, 68(21), 3121–3124MathSciNetCrossRef
4.
go back to reference Bechmann-Pasquinucci, H., & Gisin, N. (1999). Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Physical Review A, 59(6), 4238–4248MathSciNetCrossRef Bechmann-Pasquinucci, H., & Gisin, N. (1999). Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Physical Review A, 59(6), 4238–4248MathSciNetCrossRef
5.
go back to reference Inoue, K., Waks, E., & Yamanoto, Y. (2003). Differential-phase-shift quantum key distribution using coherent light. Physical Review A, 68, 022317CrossRef Inoue, K., Waks, E., & Yamanoto, Y. (2003). Differential-phase-shift quantum key distribution using coherent light. Physical Review A, 68, 022317CrossRef
6.
go back to reference Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attack. Physical Review Letters, 92, 057901CrossRef Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attack. Physical Review Letters, 92, 057901CrossRef
7.
go back to reference Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner, N., & Scarani, V. (2004). Towards practical and fast quantum cryptography. Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner, N., & Scarani, V. (2004). Towards practical and fast quantum cryptography.
8.
go back to reference Khan, M. M., Khan, M. M., & Arfeen, T. M. A. (2009). High error-rate quantum key distribution for long distance communication. New Journal of Physics, 11, 063043CrossRef Khan, M. M., Khan, M. M., & Arfeen, T. M. A. (2009). High error-rate quantum key distribution for long distance communication. New Journal of Physics, 11, 063043CrossRef
9.
go back to reference Esteban, E., & Serna, H. (2012). Quantum key distribution protocol with private- public key. arXiv: 0908.2146v4quant-ph May 12, 2012. Esteban, E., & Serna, H. (2012). Quantum key distribution protocol with private- public key. arXiv: 0908.2146v4quant-ph May 12, 2012.
10.
go back to reference Zhang, X. L. (2009). One-way quantum identity authentication based on public key. Chinese Science Bulletin, 54, 2018–2021 Zhang, X. L. (2009). One-way quantum identity authentication based on public key. Chinese Science Bulletin, 54, 2018–2021
11.
go back to reference Serna, E. H. (2013). Quantum key distribution from a random seed. arXiv: 1311.1582v2quant-ph November 12, 2013. Serna, E. H. (2013). Quantum key distribution from a random seed. arXiv: 1311.1582v2quant-ph November 12, 2013.
12.
go back to reference Shi, W., Yang, Y., & Zhou, Y. (2015). Quantum signature-masked authentication schemes. Optik, 126, 3544–3548CrossRef Shi, W., Yang, Y., & Zhou, Y. (2015). Quantum signature-masked authentication schemes. Optik, 126, 3544–3548CrossRef
13.
go back to reference Fatahi, N., & Afsheh, H. (2018). Secure electronic voting scheme by the new quantum signature-masked authentication. Physics & Astronomy International Journal, 2(6), 586–591CrossRef Fatahi, N., & Afsheh, H. (2018). Secure electronic voting scheme by the new quantum signature-masked authentication. Physics & Astronomy International Journal, 2(6), 586–591CrossRef
14.
go back to reference Gottesman, D., & Chuang, I. (2019). Quantum digital signatures. https://arxiv.org/abs/quant-ph/0105032 (2001). Accessed September 2, 2019. Gottesman, D., & Chuang, I. (2019). Quantum digital signatures. https://​arxiv.​org/​abs/​quant-ph/​0105032 (2001). Accessed September 2, 2019.
15.
go back to reference Debnath, B., Das, J. C., De, D., Mondal, S. P., Ahmadian, A., Salimi, M., & Ferrara, M. (2020). Security analysis with novel image masking based quantum-dot cellular automata information security model. IEEE Access (pp. 117159–117172). Digital Object Identifier. https://doi.org/10.1109/ACCESS.2020.3002081 Debnath, B., Das, J. C., De, D., Mondal, S. P., Ahmadian, A., Salimi, M., & Ferrara, M. (2020). Security analysis with novel image masking based quantum-dot cellular automata information security model. IEEE Access (pp. 117159–117172). Digital Object Identifier. https://​doi.​org/​10.​1109/​ACCESS.​2020.​3002081
16.
go back to reference Liu-Jun, W., Kai-Yi, Z., Jia-Yong, W., Jie, C., Yong-Hua, Y., Shi-Biao, T., Di, Y., Yan-Lin, T., Zhen, L., Yu, Y., Qiang, Z., & Jian-Wei, P. (2020). Experimental authentication of quantum key distribution with post-quantum cryptography (pp. 1–8). arXiv:2009.04662. Liu-Jun, W., Kai-Yi, Z., Jia-Yong, W., Jie, C., Yong-Hua, Y., Shi-Biao, T., Di, Y., Yan-Lin, T., Zhen, L., Yu, Y., Qiang, Z., & Jian-Wei, P. (2020). Experimental authentication of quantum key distribution with post-quantum cryptography (pp. 1–8). arXiv:2009.04662.
17.
go back to reference Liu, B., Gao, Z., Xiao, Di., Huang, W., Zhang, Z., & Bingjie, Xu. (2019). Quantum identity authentication in the counterfactual quantum key distribution protocol. Entropy (Basel), 21(5), 518MathSciNetCrossRef Liu, B., Gao, Z., Xiao, Di., Huang, W., Zhang, Z., & Bingjie, Xu. (2019). Quantum identity authentication in the counterfactual quantum key distribution protocol. Entropy (Basel), 21(5), 518MathSciNetCrossRef
18.
go back to reference Yang, L., Yang, B., & Pan, J. (2010). Quantum public-key encryption protocols with information-theoretic security. In T. Durt & V. N. Zadkov (Eds.), Proceedings of SPIE—The international society for optical engineering. (pp. 88401–88407). SPIE Press. https://doi.org/10.1117/12.922444CrossRef Yang, L., Yang, B., & Pan, J. (2010). Quantum public-key encryption protocols with information-theoretic security. In T. Durt & V. N. Zadkov (Eds.), Proceedings of SPIE—The international society for optical engineering. (pp. 88401–88407). SPIE Press. https://​doi.​org/​10.​1117/​12.​922444CrossRef
20.
go back to reference Yang, Y. G., Lei, A. H., Liu, A. Z., Zhou, Y. H., & Shi, W. M. (2016). Arbitrated quantum signature scheme based on cluster states. Quantum Information Processing, 15, 2487–2497MathSciNetCrossRef Yang, Y. G., Lei, A. H., Liu, A. Z., Zhou, Y. H., & Shi, W. M. (2016). Arbitrated quantum signature scheme based on cluster states. Quantum Information Processing, 15, 2487–2497MathSciNetCrossRef
21.
go back to reference Ekert, A., Hayden, P., & Inamori, H. (2000). Basic concepts in quantum computation. arXiv:quant-ph/0011013. Ekert, A., Hayden, P., & Inamori, H. (2000). Basic concepts in quantum computation. arXiv:quant-ph/0011013.
Metadata
Title
A New Secure Quantum Signature Masked Authentication Scheme
Authors
Vandani Verma
Kajal Malhotra
Publication date
06-05-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08527-8

Other articles of this Issue 2/2021

Wireless Personal Communications 2/2021 Go to the issue