Skip to main content
Top
Published in: Quantum Information Processing 7/2013

01-07-2013

Efficient arbitrated quantum signature and its proof of security

Authors: Qin Li, Chengqing Li, Dongyang Long, Wai Hong Chan, Changji Wang

Published in: Quantum Information Processing | Issue 7/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Literature
2.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers Systems and, Signal Processing, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers Systems and, Signal Processing, pp. 175–179 (1984)
6.
go back to reference Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)ADSCrossRef Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162–168 (1999)ADSCrossRef
7.
go back to reference Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97–106 (2011)MathSciNetMATHCrossRef Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97–106 (2011)MathSciNetMATHCrossRef
8.
go back to reference Barnum, H., Crepeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 449–458 (2002) Barnum, H., Crepeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 449–458 (2002)
9.
go back to reference Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410–3413 (1997)ADSCrossRef Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410–3413 (1997)ADSCrossRef
10.
go back to reference Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414–3417 (1997)ADSCrossRef Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414–3417 (1997)ADSCrossRef
11.
go back to reference Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, article no. 052319 (2004) Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, article no. 052319 (2004)
12.
go back to reference Gottesman, D., Chuang, I.L.: Quantum digital signatures (2001) ArXiv:quant-ph/0105032 Gottesman, D., Chuang, I.L.: Quantum digital signatures (2001) ArXiv:quant-ph/0105032
13.
go back to reference Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, article no. 042312 (2002) Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, article no. 042312 (2002)
14.
go back to reference Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, article no. 054307 (2009) Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, article no. 054307 (2009)
15.
go back to reference Zou, X.F., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, article no. 042325 (2010) Zou, X.F., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, article no. 042325 (2010)
16.
go back to reference Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295–300 (2004)MathSciNetADSMATHCrossRef Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295–300 (2004)MathSciNetADSMATHCrossRef
17.
go back to reference Lü, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Proceedings of the 1st International Symposium on Computational and Information Science, pp. 1054–1060 (2004) Lü, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Proceedings of the 1st International Symposium on Computational and Information Science, pp. 1054–1060 (2004)
18.
go back to reference Lü, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: Proceedings of the 7th International Conference on Advanced Communication Technology, pp. 514–517 (2005) Lü, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: Proceedings of the 7th International Conference on Advanced Communication Technology, pp. 514–517 (2005)
19.
go back to reference Wang, J., Zhang, Q., Tang, C.J.: Quantum signature scheme with message recovery. In: Proceedings of the 8th International Conference on Advanced Communication Technology, pp. 1375–1378 (2006) Wang, J., Zhang, Q., Tang, C.J.: Quantum signature scheme with message recovery. In: Proceedings of the 8th International Conference on Advanced Communication Technology, pp. 1375–1378 (2006)
20.
go back to reference Wang, J., Zhang, Q., Tang, C.J.: Efficient quantum signature protocol of classical messages. J. Commun. 28, 64–68 (2007) (In Chinese) Wang, J., Zhang, Q., Tang, C.J.: Efficient quantum signature protocol of classical messages. J. Commun. 28, 64–68 (2007) (In Chinese)
21.
go back to reference Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)ADSCrossRef Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)ADSCrossRef
22.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)ADSCrossRef
23.
go back to reference Inamori, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599–627 (2007)ADSCrossRef Inamori, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599–627 (2007)ADSCrossRef
24.
go back to reference Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, pp. 124–134 (1994) Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, pp. 124–134 (1994)
25.
go back to reference Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: “Arbitrated quantum signature scheme with message recovery”. Phys. Lett. A 347, 262–263 (2005)ADSCrossRef Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: “Arbitrated quantum signature scheme with message recovery”. Phys. Lett. A 347, 262–263 (2005)ADSCrossRef
26.
go back to reference Li, Q., Du, R.G., Long, D.Y., Wang, C.J., Chan, W.H.: Entanglement enhances the security of arbitrated quantum signature. Int. J. Quantum Inf. 7, 913–925 (2009)MATHCrossRef Li, Q., Du, R.G., Long, D.Y., Wang, C.J., Chan, W.H.: Entanglement enhances the security of arbitrated quantum signature. Int. J. Quantum Inf. 7, 913–925 (2009)MATHCrossRef
27.
go back to reference Zeng, G.H., Lee, M., Guo, Y., He, G.Q.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5, 553–573 (2007)MATHCrossRef Zeng, G.H., Lee, M., Guo, Y., He, G.Q.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5, 553–573 (2007)MATHCrossRef
28.
go back to reference Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z Naturforsch A: Phys. Sci. 62, 147–151 (2007)MATH Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z Naturforsch A: Phys. Sci. 62, 147–151 (2007)MATH
29.
go back to reference Yang, Y.G., Wen, Q.Y.: Quantum threshold group signature. Sci. China Ser. G-Phys. Mech. Astron. 38, 1162 (2008) (In Chinese) Yang, Y.G., Wen, Q.Y.: Quantum threshold group signature. Sci. China Ser. G-Phys. Mech. Astron. 38, 1162 (2008) (In Chinese)
30.
go back to reference Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADSCrossRef Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADSCrossRef
31.
go back to reference Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, article no. 022344 (2011) Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, article no. 022344 (2011)
32.
go back to reference Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, article no. 062330 (2011) Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, article no. 062330 (2011)
33.
go back to reference Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secur. Comput. 4, 71–80 (2007)CrossRef Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secur. Comput. 4, 71–80 (2007)CrossRef
34.
go back to reference Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)ADSCrossRef Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802–803 (1982)ADSCrossRef
35.
go back to reference Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Higher Education, Beijing (2003) Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Higher Education, Beijing (2003)
36.
go back to reference Bellare, M., Rogaway, P.: In: Proceedings of the 27th ACM Symposium on Theory of Computing, pp. 57–66 (1995) Bellare, M., Rogaway, P.: In: Proceedings of the 27th ACM Symposium on Theory of Computing, pp. 57–66 (1995)
37.
go back to reference Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) Advances in Cryptology-Eurocrypt’96, Lecture Notes in Computer Science, vol. 1070, pp. 387–398. Springer, Berlin (1996) Pointcheval, D., Stern, J.: Security proofs for signature schemes. In: Maurer, U.M. (ed.) Advances in Cryptology-Eurocrypt’96, Lecture Notes in Computer Science, vol. 1070, pp. 387–398. Springer, Berlin (1996)
38.
go back to reference Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) Advances in Cryptology-Crypto’96, Lecture Notes in Computer Science, vol. 1109, pp. 1–15. Springer, Berlin (1996) Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) Advances in Cryptology-Crypto’96, Lecture Notes in Computer Science, vol. 1109, pp. 1–15. Springer, Berlin (1996)
39.
go back to reference Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281–308 (1988)MathSciNetMATHCrossRef Goldwasser, S., Micali, S., Rivest, R.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281–308 (1988)MathSciNetMATHCrossRef
Metadata
Title
Efficient arbitrated quantum signature and its proof of security
Authors
Qin Li
Chengqing Li
Dongyang Long
Wai Hong Chan
Changji Wang
Publication date
01-07-2013
Publisher
Springer US
Published in
Quantum Information Processing / Issue 7/2013
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-013-0538-4

Other articles of this Issue 7/2013

Quantum Information Processing 7/2013 Go to the issue