Skip to main content
Top
Published in: Quantum Information Processing 5/2019

01-05-2019

Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes

Authors: Feng-Lin Chen, Li-Hua Zhang, Hai Zhang

Published in: Quantum Information Processing | Issue 5/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The quantum one-time pad (QOTP) usually serves as the quantum encryption to encrypt quantum messages in arbitrated quantum signature (AQS) schemes. The original QOTP is a qubit-by-qubit encryption algorithm with message and encrypted signature always appearing in pair in AQS, which will lead to the vulnerability of the AQS scheme. By comparing the two quantum state pairs in AQS with the C-SWAP attack, it is possible for the attacker to obtain the signer’s key, which leads to the security weakness of AQS. Accordingly, we propose a new attack on AQS scheme for the first time. In order to deal with the attack on AQS scheme, QOTP must be replaced by an improved quantum encryption scheme. Based on QOTP with confusion, we proposed an improved quantum encryption scheme which can resist the attack in AQS scheme. Security analysis shows that the improved quantum encryption scheme works efficiently and securely.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Crandall, R., Pomerance, C.: Chapter 5, Prime Numbers: A Computational Perspective, 2nd edn. Springer, Berlin (2005)MATH Crandall, R., Pomerance, C.: Chapter 5, Prime Numbers: A Computational Perspective, 2nd edn. Springer, Berlin (2005)MATH
2.
go back to reference Grover, L.K.: A fast quantum mechanical algorithm for estimating the median. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 212–219 (1996) Grover, L.K.: A fast quantum mechanical algorithm for estimating the median. In: Proceedings of the 28th ACM Symposium on Theory of Computing, pp. 212–219 (1996)
3.
go back to reference Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATHCrossRef Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATHCrossRef
4.
go back to reference Schmidt, A., Vollmer, U.: Polynomial time quantum algorithm for the computation of the unit group of a number field. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 475–480 (2005) Schmidt, A., Vollmer, U.: Polynomial time quantum algorithm for the computation of the unit group of a number field. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 475–480 (2005)
5.
go back to reference Hallgren, S.: Fast quantum algorithms for computing the unit group and class group of a number fields. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 468–474 (2005) Hallgren, S.: Fast quantum algorithms for computing the unit group and class group of a number fields. In: Proceedings of the 37th Annual ACM Symposium on Theory of Computing, pp. 468–474 (2005)
7.
go back to reference Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International (1979) Lamport, L.: Constructing digital signatures from a one-way function. Technical report CSL-98, SRI International (1979)
8.
go back to reference Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADSCrossRef Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADSCrossRef
9.
go back to reference Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef Collins, R.J., Donaldson, R.J., Dunjko, V., Wallden, P., Clarke, P.J., Andersson, E., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113(4), 040502 (2014)ADSCrossRef
10.
go back to reference Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADSCrossRef Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADSCrossRef
11.
go back to reference Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADSCrossRef Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADSCrossRef
12.
go back to reference Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADSCrossRef
13.
14.
go back to reference Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010)CrossRef Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010)CrossRef
15.
go back to reference Lee, H., Hong, C.H., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)ADSMathSciNetMATHCrossRef Lee, H., Hong, C.H., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)ADSMathSciNetMATHCrossRef
16.
go back to reference Lu, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Zhang, J., He, J.H., Fu, Y. (eds.) Lecture Notes in Computer Science, vol. 3314, pp. 1054–1060. Springer, Berlin (2004) Lu, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Zhang, J., He, J.H., Fu, Y. (eds.) Lecture Notes in Computer Science, vol. 3314, pp. 1054–1060. Springer, Berlin (2004)
17.
go back to reference Lu, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The International Conference on Advanced Communication Technology, vol. 1, pp. 514–517. IEEE (2004) Lu, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The International Conference on Advanced Communication Technology, vol. 1, pp. 514–517. IEEE (2004)
18.
go back to reference Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)ADSCrossRef Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)ADSCrossRef
19.
go back to reference Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(19), 3830 (2010)ADSCrossRef Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(19), 3830 (2010)ADSCrossRef
20.
go back to reference Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2013)ADSCrossRef Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2013)ADSCrossRef
21.
go back to reference Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773–778 (2011)ADSCrossRef Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773–778 (2011)ADSCrossRef
22.
go back to reference Zou, X.F., Qiu, D.W., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATHCrossRef Zou, X.F., Qiu, D.W., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATHCrossRef
23.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef
24.
go back to reference Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef
25.
go back to reference Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetMATHCrossRef Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)ADSMathSciNetMATHCrossRef
26.
go back to reference Zhang, K.J., Li, D., Su, Q.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 169–174 (2014) Zhang, K.J., Li, D., Su, Q.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 169–174 (2014)
27.
go back to reference Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetMATHCrossRef Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171–2181 (2015)ADSMathSciNetMATHCrossRef
28.
go back to reference Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 1–15 (2017)ADSMathSciNetMATHCrossRef Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 1–15 (2017)ADSMathSciNetMATHCrossRef
29.
go back to reference Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADSCrossRef Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADSCrossRef
30.
go back to reference Zou, X.F., Qiu, D.W.: Arbitrated quantum signature schemes: attacks and security. In: Fellows, M., Tan, X., Zhu, B. (eds.) FAW-AAIM 2013. LNCS, vol. 7924, pp. 48–59. Springer, Berlin (2013) Zou, X.F., Qiu, D.W.: Arbitrated quantum signature schemes: attacks and security. In: Fellows, M., Tan, X., Zhu, B. (eds.) FAW-AAIM 2013. LNCS, vol. 7924, pp. 48–59. Springer, Berlin (2013)
31.
go back to reference Hwang, T., Luo, Y.P., Chong, S.K.: Comment on “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85(5), 056301 (2012)ADSCrossRef Hwang, T., Luo, Y.P., Chong, S.K.: Comment on “Security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85(5), 056301 (2012)ADSCrossRef
32.
go back to reference Sun, Z.W., Du, R.G., Wang, B.H., Long, D.Y.: Improving the security of arbitrated quantum signature protocols. arXiv:1107.2459 [quant-ph] (2011) Sun, Z.W., Du, R.G., Wang, B.H., Long, D.Y.: Improving the security of arbitrated quantum signature protocols. arXiv:​1107.​2459 [quant-ph] (2011)
33.
go back to reference Zhang, W., Qiu, D.W., Zou, X.F., Mateus, P.: Cryptanalysis of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement. Quantum Inf. Process. 16(6), 150 (2017)ADSMATHCrossRef Zhang, W., Qiu, D.W., Zou, X.F., Mateus, P.: Cryptanalysis of a broadcasting multiple blind signature scheme based on quantum GHZ entanglement. Quantum Inf. Process. 16(6), 150 (2017)ADSMATHCrossRef
34.
35.
go back to reference Zou, X.F., Qiu, D.W.: Attacks and improvements of QSDC schemes based on CSS codes. In: Lecture Notes in Artificial Intelligence, ICIC2011, vol. 6215, pp. 239–246 (2011)CrossRef Zou, X.F., Qiu, D.W.: Attacks and improvements of QSDC schemes based on CSS codes. In: Lecture Notes in Artificial Intelligence, ICIC2011, vol. 6215, pp. 239–246 (2011)CrossRef
36.
go back to reference Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003)CrossRef Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003)CrossRef
37.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India, pp. 175–179 (1984)
39.
go back to reference Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADSCrossRef Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADSCrossRef
40.
go back to reference Gisin, N., Ribordy, G., Tillel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2001)ADSMATHCrossRef Gisin, N., Ribordy, G., Tillel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2001)ADSMATHCrossRef
41.
go back to reference Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1), 23–25 (2006)ADSMATHCrossRef Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1), 23–25 (2006)ADSMATHCrossRef
42.
go back to reference Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:quant-ph/0508168 (2005) Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:​quant-ph/​0508168 (2005)
44.
go back to reference Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. arXiv:1512.00711 [quant-ph] (2015) Luo, Y.P., Hwang, T.: Comment on “An arbitrated quantum signature protocol based on the chained CNOT operations encryption”. arXiv:​1512.​00711 [quant-ph] (2015)
Metadata
Title
Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes
Authors
Feng-Lin Chen
Li-Hua Zhang
Hai Zhang
Publication date
01-05-2019
Publisher
Springer US
Published in
Quantum Information Processing / Issue 5/2019
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-019-2265-y

Other articles of this Issue 5/2019

Quantum Information Processing 5/2019 Go to the issue