Skip to main content
Erschienen in: Quantum Information Processing 6/2013

01.06.2013

Attack and improvements of fair quantum blind signature schemes

verfasst von: Xiangfu Zou, Daowen Qiu

Erschienen in: Quantum Information Processing | Ausgabe 6/2013

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Blind signature schemes allow users to obtain the signature of a message while the signer learns neither the message nor the resulting signature. Therefore, blind signatures have been used to realize cryptographic protocols providing the anonymity of some participants, such as: secure electronic payment systems and electronic voting systems. A fair blind signature is a form of blind signature which the anonymity could be removed with the help of a trusted entity, when this is required for legal reasons. Recently, a fair quantum blind signature scheme was proposed and thought to be safe. In this paper, we first point out that there exists a new attack on fair quantum blind signature schemes. The attack shows that, if any sender has intercepted any valid signature, he (she) can counterfeit a valid signature for any message and can not be traced by the counterfeited blind signature. Then, we construct a fair quantum blind signature scheme by improved the existed one. The proposed fair quantum blind signature scheme can resist the preceding attack. Furthermore, we demonstrate the security of the proposed fair quantum blind signature scheme and compare it with the other one.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984)
4.
Zurück zum Zitat Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)ADSCrossRef Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)ADSCrossRef
5.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)ADSCrossRef
7.
Zurück zum Zitat Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2002)ADSCrossRef Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145–195 (2002)ADSCrossRef
8.
Zurück zum Zitat Inamori, H., Lütkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)ADSCrossRef Inamori, H., Lütkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)ADSCrossRef
9.
Zurück zum Zitat Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)MATH
10.
Zurück zum Zitat Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York (1996) Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York (1996)
11.
Zurück zum Zitat Gottesman, D., Chuang, I.: Quantum Digital Signatures. ArXiv:quant-ph/0105032 (2001) Gottesman, D., Chuang, I.: Quantum Digital Signatures. ArXiv:quant-ph/0105032 (2001)
12.
Zurück zum Zitat Barnum, H., Crépeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 449–458 (2002) Barnum, H., Crépeau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 449–458 (2002)
13.
15.
16.
Zurück zum Zitat Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)MathSciNetADSCrossRef Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)MathSciNetADSCrossRef
17.
Zurück zum Zitat Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)MathSciNetADSMATHCrossRef Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295–300 (2004)MathSciNetADSMATHCrossRef
18.
Zurück zum Zitat Lü, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Computational and Information Science 2004 (CIS 2004), LNCS, vol. 3314, pp. 1054–1060. Springer (2004) Lü, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Computational and Information Science 2004 (CIS 2004), LNCS, vol. 3314, pp. 1054–1060. Springer (2004)
19.
Zurück zum Zitat Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with message recovery. In: IEEE 8th International Conference on Advanced Communication Technology, 2006 (ICACT 2006), vol. 2, pp. 1375–1378. (2006) Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with message recovery. In: IEEE 8th International Conference on Advanced Communication Technology, 2006 (ICACT 2006), vol. 2, pp. 1375–1378. (2006)
20.
Zurück zum Zitat Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62(3/4), 147 (2007)MATH Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62(3/4), 147 (2007)MATH
21.
Zurück zum Zitat Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quant. Inf. 5(4), 553–573 (2007)MATHCrossRef Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quant. Inf. 5(4), 553–573 (2007)MATHCrossRef
22.
Zurück zum Zitat Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)ADSCrossRef Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)ADSCrossRef
23.
Zurück zum Zitat Lu, X., Feng, D.: Quantum digital signature based on quantum one-way functions. In: The 7th International Conference on Advanced Communication Technology, 2005 (ICACT 2005), IEEE, vol. 1, pp. 514–517. (2004) Lu, X., Feng, D.: Quantum digital signature based on quantum one-way functions. In: The 7th International Conference on Advanced Communication Technology, 2005 (ICACT 2005), IEEE, vol. 1, pp. 514–517. (2004)
24.
Zurück zum Zitat Cao, Z., Markowitch, O.: Security analysis of one quantum digital signature scheme. In: The Sixth International Conference on Information Technology: New Generations, 2009 (ITNG’09), IEEE, pp. 1574–1576. (2009) Cao, Z., Markowitch, O.: Security analysis of one quantum digital signature scheme. In: The Sixth International Conference on Information Technology: New Generations, 2009 (ITNG’09), IEEE, pp. 1574–1576. (2009)
25.
Zurück zum Zitat Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)ADSCrossRef
27.
Zurück zum Zitat Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)ADSCrossRef Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)ADSCrossRef
28.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)ADSCrossRef
29.
Zurück zum Zitat Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quant. Inf. Comput. 5(1), 41–48 (2005)MathSciNet Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quant. Inf. Comput. 5(1), 41–48 (2005)MathSciNet
30.
Zurück zum Zitat Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto. vol. 82, pp. 199–203 (1982) Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto. vol. 82, pp. 199–203 (1982)
31.
Zurück zum Zitat Stadler, M., Piveteau, J., Camenisch, J.: Fair blind signatures. In: Advances in Cryptology-Eurocrypt’95, pp. 209–219. Springer (1995) Stadler, M., Piveteau, J., Camenisch, J.: Fair blind signatures. In: Advances in Cryptology-Eurocrypt’95, pp. 209–219. Springer (1995)
32.
Zurück zum Zitat Strang, G.: Linear Algebra and Its Applications, 4th edn. Brooks/Cole, Florence (2005) Strang, G.: Linear Algebra and Its Applications, 4th edn. Brooks/Cole, Florence (2005)
Metadaten
Titel
Attack and improvements of fair quantum blind signature schemes
verfasst von
Xiangfu Zou
Daowen Qiu
Publikationsdatum
01.06.2013
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 6/2013
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-012-0509-1

Weitere Artikel der Ausgabe 6/2013

Quantum Information Processing 6/2013 Zur Ausgabe

Neuer Inhalt