Abstract
The cryptanalysis about enhancement on the quantum blind signature based on two-state vector formalism is further researched. A special attack strategy is put forward. In this strategy, the dishonest signer Bob only need make two measurements in the Z-basis. It is shown that he can illegally reveal 25 % of the secret key and message of the blind signature requester.
References
Wen, X., Niu, X., Ji, L., Tian, Y.: Opt. Commun. 282, 666 (2009)
Xu, R., Huang, L., Yang, W., He, L.: Opt. Commun. 284, 3654 (2011)
Yin, X.R., Ma, W.P., Liu, W.Y.: Int. J. Theor. Phys. 51, 455 (2012)
Lo, H.K., Ko, T.M.: Quantum Inf. Comput. 5, 41 (2005)
Qi, S., Zheng, H., Qiaoyan, W., Wenmin, L.: Opt. Commun. 283, 4408 (2010)
Yang, C.W., Hwang, T., Luo, Y.P.: Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0362-2
Zhou, N., Liu, Y., Zeng, G., Xiong, J., Zhu, F.: Physica A 375, 693 (2007)
Author information
Authors and Affiliations
Corresponding authors
Additional information
Project supported by the National Natural Science Foundation of China (Nos. 61003287, 61170272, 61272514), the Major national science and technology projects (No. 2012ZX03002012-3), the Specialized Research Fund for the Doctoral Program of Higher Education (20100005120002), the Fok Ying Tong Education Foundation (No. 131067), National Science Foundation of China Innovative Grant (70921061), the CAS/SAFEA International Partnership Program for Creative Research Teams and the Fundamental Research Funds for the Central Universities (No. BUPT2012RC0221).
Rights and permissions
About this article
Cite this article
Zhang, M., Xu, GA., Chen, XB. et al. Attack on the Improved Quantum Blind Signature Protocol. Int J Theor Phys 52, 331–335 (2013). https://doi.org/10.1007/s10773-012-1339-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-012-1339-8