Skip to main content
Erschienen in: Quantum Information Processing 6/2016

01.06.2016

Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation

verfasst von: Wei Zhang, Daowen Qiu, Xiangfu Zou

Erschienen in: Quantum Information Processing | Ausgabe 6/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Recently, a broadcasting multiple blind signature scheme based on quantum teleportation has been proposed for the first time. It is claimed to have unconditional security and properties of quantum multiple signature and quantum blind signature. In this paper, we analyze the security of the protocol and show that each signatory can learn the signed message by a single-particle measurement and the signed message can be modified at random by any attacker according to the scheme. Furthermore, there are some participant attacks and external attacks existing in the scheme. Finally, we present an improved scheme and show that it can resist all of the mentioned attacks. Additionally, the secret keys can be used again and again, making it more efficient and practical.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefMATH Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetCrossRefMATH
3.
4.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)ADSMathSciNetCrossRef Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)ADSMathSciNetCrossRef
5.
Zurück zum Zitat Li, Q., Li, C., Long, D.Y., et al.: Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7), 2427–2439 (2013)ADSMathSciNetCrossRefMATH Li, Q., Li, C., Long, D.Y., et al.: Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7), 2427–2439 (2013)ADSMathSciNetCrossRefMATH
6.
Zurück zum Zitat Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2014)ADSCrossRef Luo, Y.P., Hwang, T.: Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum Inf. Process. 13(1), 113–120 (2014)ADSCrossRef
7.
Zurück zum Zitat Yu, C.H., Guo, D., Lin, S.: Arbitrated quantum signature scheme based on reusable key. Sci. China Phys. Mech. Astron. 57(11), 2079–2085 (2014)ADSMathSciNetCrossRef Yu, C.H., Guo, D., Lin, S.: Arbitrated quantum signature scheme based on reusable key. Sci. China Phys. Mech. Astron. 57(11), 2079–2085 (2014)ADSMathSciNetCrossRef
8.
Zurück zum Zitat Yin, X.R., Ma, W.P., Liu, W.Y.: Quantum proxy group signature scheme with-type entangled states. Int. J. Quantum Inf. 10, 1250041 (2012)MathSciNetCrossRefMATH Yin, X.R., Ma, W.P., Liu, W.Y.: Quantum proxy group signature scheme with-type entangled states. Int. J. Quantum Inf. 10, 1250041 (2012)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)ADSMathSciNetCrossRef Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)ADSMathSciNetCrossRef
10.
Zurück zum Zitat Wen, X., Chen, Y., Fang, J.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)ADSMathSciNetCrossRefMATH Wen, X., Chen, Y., Fang, J.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)ADSMathSciNetCrossRefMATH
11.
Zurück zum Zitat Cao, H.J., Huang, J., Yu, Y.F., et al.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53(9), 3095–3100 (2014)CrossRefMATH Cao, H.J., Huang, J., Yu, Y.F., et al.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53(9), 3095–3100 (2014)CrossRefMATH
12.
Zurück zum Zitat Wen, X., Tian, Y., Ji, L., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)ADSCrossRefMATH Wen, X., Tian, Y., Ji, L., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)ADSCrossRefMATH
13.
Zurück zum Zitat Wen, X.: An E-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH Wen, X.: An E-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)CrossRefMATH
14.
Zurück zum Zitat Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654–3658 (2011)ADSCrossRef Xu, R., Huang, L., Yang, W., et al.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654–3658 (2011)ADSCrossRef
15.
Zurück zum Zitat Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)ADSCrossRef Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)ADSCrossRef
16.
Zurück zum Zitat Qi, S., Zheng, H., Wen, Q., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef Qi, S., Zheng, H., Wen, Q., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)ADSCrossRef
17.
Zurück zum Zitat Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)MathSciNetCrossRefMATH Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with-type entangled states. Int. J. Theor. Phys. 51(2), 455–461 (2012)MathSciNetCrossRefMATH
18.
Zurück zum Zitat Lin, T.S., Chen, Y., Chang, T.H., et al.: Quantum blind signature based on quantum circuit. Nanotechnology (IEEE-NANO). In: 2014 IEEE 14th International Conference on. IEEE, pp. 868–872 (2014) Lin, T.S., Chen, Y., Chang, T.H., et al.: Quantum blind signature based on quantum circuit. Nanotechnology (IEEE-NANO). In: 2014 IEEE 14th International Conference on. IEEE, pp. 868–872 (2014)
19.
Zurück zum Zitat Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Nat. A 62(3/4), 147 (2007)MATH Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Nat. A 62(3/4), 147 (2007)MATH
20.
Zurück zum Zitat Wen, X., Liu, Y.: A realizable quantum sequential multi-signature scheme. Dianzi Xuebao (Acta Electron. Sin.) 35(6), 1079–1083 (2007)MathSciNet Wen, X., Liu, Y.: A realizable quantum sequential multi-signature scheme. Dianzi Xuebao (Acta Electron. Sin.) 35(6), 1079–1083 (2007)MathSciNet
21.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A. 84(2), 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A. 84(2), 022344 (2011)ADSCrossRef
22.
Zurück zum Zitat Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)ADSCrossRef
23.
Zurück zum Zitat Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRefMATH Zuo, H., Zhang, K., Song, T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)ADSMathSciNetCrossRefMATH
24.
Zurück zum Zitat Kejia, Z., Dan, L., Qi, S.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 015102 (2014)ADSCrossRef Kejia, Z., Dan, L., Qi, S.: Security of the arbitrated quantum signature protocols revisited. Phys. Scr. 89(1), 015102 (2014)ADSCrossRef
25.
Zurück zum Zitat Yang, C.W., Luo, Y.P., Hwang, T.: Forgery attack on one-time proxy signature and the improvement. Quantum Inf. Process. 13(9), 2007–2016 (2014)ADSMathSciNetCrossRefMATH Yang, C.W., Luo, Y.P., Hwang, T.: Forgery attack on one-time proxy signature and the improvement. Quantum Inf. Process. 13(9), 2007–2016 (2014)ADSMathSciNetCrossRefMATH
26.
Zurück zum Zitat Liu, Z.H., Chen, H.W., Wang, D., et al.: Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 13(6), 1345–1351 (2014)ADSMathSciNetCrossRefMATH Liu, Z.H., Chen, H.W., Wang, D., et al.: Cryptanalysis and improvement of three-particle deterministic secure and high bit-rate direct quantum communication protocol. Quantum Inf. Process. 13(6), 1345–1351 (2014)ADSMathSciNetCrossRefMATH
27.
Zurück zum Zitat Wang, T.Y., Cai, X.Q., Zhang, R.L.: Security of a sessional blind signature based on quantum cryptograph. Quantum Inf. Process. 13(8), 1677–1685 (2014)ADSMathSciNetCrossRefMATH Wang, T.Y., Cai, X.Q., Zhang, R.L.: Security of a sessional blind signature based on quantum cryptograph. Quantum Inf. Process. 13(8), 1677–1685 (2014)ADSMathSciNetCrossRefMATH
28.
Zurück zum Zitat Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41–48 (2005)MathSciNetMATH Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5(1), 41–48 (2005)MathSciNetMATH
29.
Zurück zum Zitat Gao, F., Guo, F., Wen, Q., Zhu, F.: Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef Gao, F., Guo, F., Wen, Q., Zhu, F.: Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)ADSCrossRef
30.
Zurück zum Zitat Zhang, Y., Li, C., Guo, G.: Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)ADSMathSciNetCrossRef Zhang, Y., Li, C., Guo, G.: Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)ADSMathSciNetCrossRef
31.
Zurück zum Zitat Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329–334 (2007)MathSciNetMATH Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7(4), 329–334 (2007)MathSciNetMATH
32.
Zurück zum Zitat Wang, T., Wen, Q., Chen, X.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283(24), 5261–5263 (2010)ADSCrossRef Wang, T., Wen, Q., Chen, X.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283(24), 5261–5263 (2010)ADSCrossRef
33.
Zurück zum Zitat Gao, F., Wen, Q., Zhu, F.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)ADSCrossRef Gao, F., Wen, Q., Zhu, F.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189 (2008)ADSCrossRef
34.
Zurück zum Zitat Wang, T., Wen, Q., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008) Wang, T., Wen, Q., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
35.
Zurück zum Zitat Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)ADSCrossRef Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)ADSCrossRef
36.
Zurück zum Zitat Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. Chin. Phys. Mech. Astron. 53(3), 491–495 (2010)ADSCrossRef Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. Chin. Phys. Mech. Astron. 53(3), 491–495 (2010)ADSCrossRef
37.
Zurück zum Zitat Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101–103 (2006)ADSCrossRefMATH Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101–103 (2006)ADSCrossRefMATH
38.
Zurück zum Zitat Wjcik, A.: Eavesdropping on the Ping-Pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)ADSCrossRef Wjcik, A.: Eavesdropping on the Ping-Pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)ADSCrossRef
39.
Zurück zum Zitat Wjcik, A.: Comment on quantum dense key distribution. Phys. Rev. A 71, 016301 (2005)ADSCrossRef Wjcik, A.: Comment on quantum dense key distribution. Phys. Rev. A 71, 016301 (2005)ADSCrossRef
40.
Zurück zum Zitat Cai, Q.: The Ping-Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)ADSCrossRef Cai, Q.: The Ping-Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)ADSCrossRef
41.
Zurück zum Zitat Gao, F., Guo, F., Wen, Q., Hu, F.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)ADSCrossRef Gao, F., Guo, F., Wen, Q., Hu, F.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)ADSCrossRef
42.
Zurück zum Zitat Gao, F., Wen, Q., Zhu, F.: Comment on: quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 748–750 (2007)ADSCrossRef Gao, F., Wen, Q., Zhu, F.: Comment on: quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 748–750 (2007)ADSCrossRef
43.
Zurück zum Zitat Gao, F., Lin, S., Wen, Q., Zhu, F.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)ADSCrossRef Gao, F., Lin, S., Wen, Q., Zhu, F.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)ADSCrossRef
44.
Zurück zum Zitat Gao, F., Qin, S., Wen, Q., Zhu, F.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)ADSCrossRef Gao, F., Qin, S., Wen, Q., Zhu, F.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283(1), 192–195 (2010)ADSCrossRef
45.
Zurück zum Zitat Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)ADSCrossRef
46.
Zurück zum Zitat Deng, F., Li, X., Zhou, H., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef Deng, F., Li, X., Zhou, H., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)ADSCrossRef
47.
Zurück zum Zitat Jain, N., Anisimova, E., Khan, I., et al.: Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 16(12), 123030 (2014)ADSMathSciNetCrossRef Jain, N., Anisimova, E., Khan, I., et al.: Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 16(12), 123030 (2014)ADSMathSciNetCrossRef
48.
Zurück zum Zitat Yang, Y.G., Sun, S.J., Zhao, Q.Q.: Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2), 681–686 (2014)ADSMathSciNetCrossRefMATH Yang, Y.G., Sun, S.J., Zhao, Q.Q.: Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2), 681–686 (2014)ADSMathSciNetCrossRefMATH
49.
Zurück zum Zitat Wang, T., Wen, Q.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11(5), 434–443 (2011)MathSciNetMATH Wang, T., Wen, Q.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11(5), 434–443 (2011)MathSciNetMATH
50.
Zurück zum Zitat Wang, T., Wen, Q., Zhu, F.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)ADSMathSciNetCrossRef Wang, T., Wen, Q., Zhu, F.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)ADSMathSciNetCrossRef
51.
Zurück zum Zitat Tian, Y., Chen, H., Ji, S., et al.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quantum Electron. 46(6), 769–777 (2014)CrossRef Tian, Y., Chen, H., Ji, S., et al.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quantum Electron. 46(6), 769–777 (2014)CrossRef
52.
Zurück zum Zitat Kim, T., Choi, J.W., Jho, N.S., et al.: Quantum messages with signatures forgeable in arbitrated quantum signature schemes. Phys. Scr. 90(2), 025101 (2015)ADSCrossRef Kim, T., Choi, J.W., Jho, N.S., et al.: Quantum messages with signatures forgeable in arbitrated quantum signature schemes. Phys. Scr. 90(2), 025101 (2015)ADSCrossRef
Metadaten
Titel
Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation
verfasst von
Wei Zhang
Daowen Qiu
Xiangfu Zou
Publikationsdatum
01.06.2016
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 6/2016
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-016-1289-9

Weitere Artikel der Ausgabe 6/2016

Quantum Information Processing 6/2016 Zur Ausgabe

Neuer Inhalt