Abstract
The security analysis of a batch proxy quantum blind signature scheme is given, which shows it does not satisfy the verifiability of proxy blind signature. Furthermore, a malicious signature receiver can forge valid batch proxy blind signatures. Therefore, this scheme also does not satisfy the unforgeability of proxy blind signature in the sense. A feasible method to deal with these problems is also discussed in the end.
Similar content being viewed by others
References
Lin, W D , Jan, J K : A security personal learning tools using a proxy blind signature scheme. In: Proceedings of International Conference on Chinese Language Computing, pp. 273–277. IEEE Press Illinois, USA (2000)
Wang, T Y , Cai, X Q, Zhang, J Z: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)
Tan, Z W : An off-line electrnic cash system based on proxy blind signature. Comput. J. 54(4), 505–512 (2011)
Wen, X J , Chen, Y Z , Fang, J B : An inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(1), 549–558 (2013)
Cai, X Q , Wei, C Y : Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(4), 1651–1657 (2013)
Wang, T Y , Cai, X Q , Zhang, J Z : New proxy blind signature scheme based on bilinear pairings. Comput. Appl. 24(2), 130–131 (2007)
Shor, P : Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Grover, L K : Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)
Tian, Y , Chen, H , Yan, G, et al.: A proxy blind signature scheme based on quantum entanglement. Opt. Quant. Electron. doi:10.1007/s11082-013-9753-6
Cao, H J , Zhu, Y Y , Li, P F : A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. doi:10.1007/s10773-013-1826-6
Wang, T Y , Wen, Q Y , Gao, F, et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Gao, F , Qin, S J , Guo, F Z, et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)
Wang, T. Y., Wen, Q. Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. & Comput. 11(5–6), 434–443 (2011)
Gao, F , Qin, S J , Guo, F Z, et al.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)
Gao, F , Guo, F Z , Wen, Q Y, et al.: Comment on Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101(20), 208901 (2008)
Zhang, Y S , Li, C F, Guo, G C: Comment on Quantum key distribution without alternative measurements. Phys. Rev. A 63(3), 036301 (2001)
Gao, F , Qin, S J , Wen, Q Y, et al., et al.: A simple participant attack on the Bradler-Dusek protocol. Quant. Inf. Comput. 7(4), 329–334 (2007)
Gao, F , Wen, Q Y , Zhu, F C : Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3193 (2008)
Wang, T Y , Qin, S J , Wen, Q Y, et al. : Analysis and improvement of multiparty controlled quantum secure direct communication protocol. Acta Phys. Sin. 57(12), 7452–7456 (2008)
Wójcik, A : Eavesdropping on the ping-pongquantum communication protocol. Phys. Rev. Lett. 90(15), 2003
Cai, Q Y : The Ping-Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)
Gao, F , Guo, F Z , Wen, Q Y, et al.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77(1), 014302 (2008)
Gao, F , Qin, S J , Wen, Q Y, et al. : Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger- Horne-Zeilinger state. Opt. Commun 283(1), 192–195 (2010)
Gisin, N, Fasel, S, Kraus, B, et al.: Trojan-horse attacks on quantumkey-Distribution systems. Phys. Rev. A 73(2), 022320 (2006)
Deng, F G, Li, X H , Zhou, H Y, et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)
Qin, S J , Gao, F , Wen, Q Y, et al.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101–103 (2006)
Wang, T Y , Wen, Q Y , Zhu, F C : Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)
Wang, T Y , Li, Y P : Cryptanalysis of dynamic quantum secret sharing. Quant. Inf. Process. 12(5), 1991–1997 (2013)
Shi, J J , Shi, R H , Guo, Y, et al.: Batch proxy quantum blind signature scheme. Sci. Chi. Inf. Sci. 56(5), 0521151 (2013)
Zeng, G H , Keitel, C H : Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Yang, Y G , Wen, Q Y : Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chi. Phys. Mech. Astron. 51(8), 1079–1088 (2008)
Wang, T Y , Wei, Z L : One-time proxy signature based on quantum cryptography. Quant. Inf. Process. 11(2), 455–463 (2012)
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61202317, 61272015, 61202367), the Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042), the Young Key Teacher Foundation in Universities of Henan Province (Grant No. 2012GGJS-157), the Natural Science Foundation of Henan Province (Grant No. 132300410316), and the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 13B110150).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Cai, XQ., Zheng, YH. & Zhang, RL. Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme. Int J Theor Phys 53, 3109–3115 (2014). https://doi.org/10.1007/s10773-014-2107-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-014-2107-8