Skip to main content
Top

2020 | OriginalPaper | Chapter

A Semi-quantum Group Signature Scheme Based on Bell States

Authors : Jinqiao Dai, Shibin Zhang, Yan Chang, Xueyang Li, Tao Zheng

Published in: Artificial Intelligence and Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, we propose a group signature scheme based on Bell states, which restricts the group member Alice to transmit the signature message to a fully quantum ability group manager TP through semi-quantum communication, then TP sends the signature message to an outsider verifier Bob to verify the signature. The signature message is sent by TP which can ensure Alice’s anonymous in group signature scheme. Besides, the limited Alice is a “classic” user in semi-quantum communication and can only measure, prepare, reorder and send quantum states only in the classical basis {\( \left| 0 \right\rangle \), \( \left| 1 \right\rangle \)}, while the quantum TP can perform arbitrary quantum operations. Besides, the “classical” user Alice does not require quantum memory. Finally, the security analysis shows that the scheme can not only resist the repudiation of the signer and denial of the verifier, but also detect the forgery of the attacker, and the efficiency of the scheme is slightly higher than most of the previous signature schemes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
2.
go back to reference Shor, P.W.: Polynominal-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Sci. Statist. Comput. 26, 1484–1509 (1997)MathSciNetCrossRef Shor, P.W.: Polynominal-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Sci. Statist. Comput. 26, 1484–1509 (1997)MathSciNetCrossRef
3.
go back to reference Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)CrossRef Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)CrossRef
4.
go back to reference Barnum, H., Crepeau, C., Gottesman, D., et al.: Authentication of quantum messages, pp. 449–58. IEEE Computer Society, Washington, DC (2002) Barnum, H., Crepeau, C., Gottesman, D., et al.: Authentication of quantum messages, pp. 449–58. IEEE Computer Society, Washington, DC (2002)
5.
go back to reference Busch, P., Heinonen, T., Lahti, P.: Heisenberg’s uncertainty principle. Phys. Rep. 452(6), 155–176 (2007)CrossRef Busch, P., Heinonen, T., Lahti, P.: Heisenberg’s uncertainty principle. Phys. Rep. 452(6), 155–176 (2007)CrossRef
6.
7.
go back to reference Wen, X., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)CrossRef Wen, X., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)CrossRef
9.
go back to reference Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)MathSciNetCrossRef Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)MathSciNetCrossRef
11.
go back to reference Zhang, J.Z., Yang, Y.Y., Xie, S.C.: A third-party e-payment protocol based on quantum group blind signature. Int. J. Theor. Phys. 56(9), 2981–2989 (2017)MathSciNetCrossRef Zhang, J.Z., Yang, Y.Y., Xie, S.C.: A third-party e-payment protocol based on quantum group blind signature. Int. J. Theor. Phys. 56(9), 2981–2989 (2017)MathSciNetCrossRef
12.
go back to reference Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)MathSciNetCrossRef Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)MathSciNetCrossRef
13.
go back to reference Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)CrossRef Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)CrossRef
14.
go back to reference Sun, Z.W., Du, R.G., Long, D.Y.: Quantum key distribution with limited classical Bob. Int. J. Quant. Inform. 11(1), 1350005 (2013)MathSciNetCrossRef Sun, Z.W., Du, R.G., Long, D.Y.: Quantum key distribution with limited classical Bob. Int. J. Quant. Inform. 11(1), 1350005 (2013)MathSciNetCrossRef
17.
18.
go back to reference Zou, X.F., Qiu, D.W.: Three-step semi-quantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)CrossRef Zou, X.F., Qiu, D.W.: Three-step semi-quantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)CrossRef
19.
go back to reference Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)CrossRef Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)CrossRef
20.
go back to reference Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 46(4), 045304 (2013)MathSciNetCrossRef Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 46(4), 045304 (2013)MathSciNetCrossRef
21.
go back to reference Yan, L.L., Chang, Y., Zhang, S.B.: Measure-resend semi-quantum private comparison scheme using GHZ class states. Comput. Mater. Continua 61(2), 877–887 (2019)CrossRef Yan, L.L., Chang, Y., Zhang, S.B.: Measure-resend semi-quantum private comparison scheme using GHZ class states. Comput. Mater. Continua 61(2), 877–887 (2019)CrossRef
22.
go back to reference Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)MathSciNetCrossRef Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)MathSciNetCrossRef
23.
go back to reference Chang, Y., Zhang, S.B., Yan, L.L.: A quantum authorization management protocol based on EPR-pairs. Comput. Mater. Continua 59(3), 1005–1014 (2019)CrossRef Chang, Y., Zhang, S.B., Yan, L.L.: A quantum authorization management protocol based on EPR-pairs. Comput. Mater. Continua 59(3), 1005–1014 (2019)CrossRef
24.
go back to reference Zhang, S.B., Chang, Y., Yan, L.L.: Quantum communication networks and trust management: a survey. Comput. Mater. Continua 61(3), 1145–1174 (2019)CrossRef Zhang, S.B., Chang, Y., Yan, L.L.: Quantum communication networks and trust management: a survey. Comput. Mater. Continua 61(3), 1145–1174 (2019)CrossRef
25.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)CrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)CrossRef
26.
go back to reference Mayers, D.: Unconditional security in quantum cryptography. J. Assoc.: Comput. Math. 48(1), 351–406 (2001)MathSciNetMATH Mayers, D.: Unconditional security in quantum cryptography. J. Assoc.: Comput. Math. 48(1), 351–406 (2001)MathSciNetMATH
27.
go back to reference Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)CrossRef Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)CrossRef
28.
go back to reference Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRef Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)CrossRef
29.
go back to reference Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRef Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)CrossRef
30.
go back to reference Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRef Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)CrossRef
31.
go back to reference Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)CrossRef Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)CrossRef
32.
go back to reference Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)CrossRef Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)CrossRef
Metadata
Title
A Semi-quantum Group Signature Scheme Based on Bell States
Authors
Jinqiao Dai
Shibin Zhang
Yan Chang
Xueyang Li
Tao Zheng
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-57881-7_22

Premium Partner