Skip to main content
Top
Published in: Quantum Information Processing 9/2014

01-09-2014

Cryptanalysis of a sessional blind signature based on quantum cryptography

Authors: Qi Su, Wen-Min Li

Published in: Quantum Information Processing | Issue 9/2014

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. A blind signature is a form of digital signature in which the content of a message is disguised (blinded) before it is signed to protect the privacy of the message from the signatory. For signing quantum messages, some quantum blind signature protocols have been proposed. Recently, Khodambashi et al. (Quantum Inf Process 13:121, 2014) proposed a sessional blind signature based on quantum cryptography. It was claimed that these protocol could guarantee unconditional security. However, after our analysis, we find that the signature protocol will cause the key information leakage in the view of information theory. Taking advantage of loophole, the message sender can succeed in forging the signature without the knowledge of the whole exact key between the verifier and him. To conquer this shortcoming, we construct an improved protocol based on it and the new protocol can resist the key information leakage attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984), pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE Press, New York, 1984), pp. 175–179 (1984)
2.
go back to reference Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1098 (2001) (in Chinese) Zeng, G., Ma, W., Wang, X., Zhu, H.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1098 (2001) (in Chinese)
5.
go back to reference Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295 (2004)MathSciNetCrossRefADSMATH Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295 (2004)MathSciNetCrossRefADSMATH
9.
go back to reference Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)CrossRefADS Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)CrossRefADS
10.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)CrossRefADS
11.
go back to reference Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)CrossRefADS Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)CrossRefADS
12.
go back to reference Wen, X.: An e-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH Wen, X.: An e-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH
13.
14.
go back to reference Wen, X., Nie, Z.: An e-payment system based on quantum blind and group signature. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 50–55 (2010) Wen, X., Nie, Z.: An e-payment system based on quantum blind and group signature. In: 2010 Second International Symposium on Data, Privacy and E-Commerce (ISDPE), pp. 50–55 (2010)
15.
go back to reference Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651 (2013)MathSciNetCrossRefADSMATH Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651 (2013)MathSciNetCrossRefADSMATH
16.
go back to reference Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)MathSciNetCrossRefMATH Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)MathSciNetCrossRefMATH
17.
go back to reference Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666 (2009)CrossRefADS Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666 (2009)CrossRefADS
18.
go back to reference Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408 (2010)CrossRefADS Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408 (2010)CrossRefADS
19.
go back to reference Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86(5), 055006 (2012)CrossRefMATH Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86(5), 055006 (2012)CrossRefMATH
20.
go back to reference Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)CrossRefADS Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)CrossRefADS
21.
go back to reference Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)CrossRefADS Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654 (2011)CrossRefADS
22.
go back to reference Shi, J., Shi, R., Guo, Y., Peng, X., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56(5), 1 (2013)MathSciNetCrossRef Shi, J., Shi, R., Guo, Y., Peng, X., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56(5), 1 (2013)MathSciNetCrossRef
23.
go back to reference Shi, J., Shi, R., Tang, Y., Lee, M.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum fourier transform. Quantum Inf. Process. 10(5), 653 (2011)MathSciNetCrossRefMATH Shi, J., Shi, R., Tang, Y., Lee, M.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum fourier transform. Quantum Inf. Process. 10(5), 653 (2011)MathSciNetCrossRefMATH
24.
go back to reference Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M., Park, D.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum fourier transform. Int. J. Theor. Phys. 51, 1038 (2012)CrossRefMATH Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M., Park, D.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum fourier transform. Int. J. Theor. Phys. 51, 1038 (2012)CrossRefMATH
25.
go back to reference Shi, R., Shi, J., Guo, Y., Lee, M.H.: Multiparty quantum group signature scheme with quantum parallel computation. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 905–910 (2011) Shi, R., Shi, J., Guo, Y., Lee, M.H.: Multiparty quantum group signature scheme with quantum parallel computation. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 905–910 (2011)
26.
go back to reference Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41 (2005)MathSciNetMATH Lo, H.K., Ko, T.M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41 (2005)MathSciNetMATH
27.
go back to reference Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”. Phys. Rev. Lett. 101, 208901 (2008)CrossRefADS
28.
go back to reference Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [phys. rev. a 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on “quantum key distribution without alternative measurements” [phys. rev. a 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)MathSciNetCrossRefADS
29.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the brádler-dušek protocol. Quantum Inf. Comput. 7(4), 329 (2007)MathSciNetMATH
30.
go back to reference Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)CrossRefADS
31.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630 (2011)CrossRefADS Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630 (2011)CrossRefADS
32.
go back to reference Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53, 491 (2010)CrossRefADS Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53, 491 (2010)CrossRefADS
33.
go back to reference Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101 (2006)CrossRefADSMATH Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101 (2006)CrossRefADSMATH
34.
go back to reference Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS Wójcik, A.: Eavesdropping on the “ping-pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)CrossRefADS
35.
go back to reference Wójcik, A.: Comment on “quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)CrossRefADS Wójcik, A.: Comment on “quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)CrossRefADS
36.
go back to reference Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS Cai, Q.Y.: The “ping-pong” protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)CrossRefADS
37.
go back to reference Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)CrossRefADS Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)CrossRefADS
38.
go back to reference Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [phys. lett. a 350 (2006) 174]. Phys. Lett. A 360(6), 748 (2007)CrossRefADS Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: “quantum exam” [phys. lett. a 350 (2006) 174]. Phys. Lett. A 360(6), 748 (2007)CrossRefADS
39.
go back to reference Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)CrossRefADS
40.
go back to reference Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192 (2010)CrossRefADS Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192 (2010)CrossRefADS
41.
go back to reference Huang, W., Zuo, H.J., Li, Y.B.: Cryptanalysis and improvement of a multi-user quantum communication network using \(\chi \)-type entangled states. Int. J. Theor. Phys. 52(4), 1354 (2013)MathSciNetCrossRefMATH Huang, W., Zuo, H.J., Li, Y.B.: Cryptanalysis and improvement of a multi-user quantum communication network using \(\chi \)-type entangled states. Int. J. Theor. Phys. 52(4), 1354 (2013)MathSciNetCrossRefMATH
42.
go back to reference Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)CrossRefADS
43.
go back to reference Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72, 044302 (2005)CrossRefADS
44.
go back to reference Gao, F., Guo, F., Wen, Q., Zhu, F.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559 (2008)CrossRefADS Gao, F., Guo, F., Wen, Q., Zhu, F.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559 (2008)CrossRefADS
45.
go back to reference Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121 (2014)CrossRefADSMathSciNet Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121 (2014)CrossRefADSMathSciNet
46.
go back to reference Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two bell states and the shared secret bell state. Phys. Scr. 89(1), 015103 (2014)CrossRefADS Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two bell states and the shared secret bell state. Phys. Scr. 89(1), 015103 (2014)CrossRefADS
47.
go back to reference Zhou, N.R., Wu, G.T., Gong, L.H., Liu, S.Q.: Secure quantum dialogue protocol based on W states without information leakage. Int. J. Theor. Phys. 52(9), 3204 (2013)MathSciNetCrossRefMATH Zhou, N.R., Wu, G.T., Gong, L.H., Liu, S.Q.: Secure quantum dialogue protocol based on W states without information leakage. Int. J. Theor. Phys. 52(9), 3204 (2013)MathSciNetCrossRefMATH
48.
go back to reference Wang, L.Y., Chen, X.B., Xu, G., Yang, Y.X.: Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs. Opt. Commun. 284(7), 1719 (2011)CrossRefADS Wang, L.Y., Chen, X.B., Xu, G., Yang, Y.X.: Information leakage in three-party simultaneous quantum secure direct communication with EPR pairs. Opt. Commun. 284(7), 1719 (2011)CrossRefADS
49.
go back to reference Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace bb84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)CrossRefADS Nauerth, S., Fürst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace bb84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)CrossRefADS
50.
51.
go back to reference Huang, W., Guo, F.Z., Huang, Z., Wen, Q.Y., Zhu, F.C.: Three-particle QKD protocol against a collective noise. Opt. Commun. 284(1), 536 (2011)CrossRefADS Huang, W., Guo, F.Z., Huang, Z., Wen, Q.Y., Zhu, F.C.: Three-particle QKD protocol against a collective noise. Opt. Commun. 284(1), 536 (2011)CrossRefADS
52.
go back to reference Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)CrossRefADS Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91, 087901 (2003)CrossRefADS
53.
go back to reference Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100308 (2012)CrossRefADS Huang, W., Wen, Q.Y., Jia, H.Y., Qin, S.J., Gao, F.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100308 (2012)CrossRefADS
Metadata
Title
Cryptanalysis of a sessional blind signature based on quantum cryptography
Authors
Qi Su
Wen-Min Li
Publication date
01-09-2014
Publisher
Springer US
Published in
Quantum Information Processing / Issue 9/2014
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-014-0778-y

Other articles of this Issue 9/2014

Quantum Information Processing 9/2014 Go to the issue