Skip to main content
Log in

Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

The security analysis of a batch proxy quantum blind signature scheme is given, which shows it does not satisfy the verifiability of proxy blind signature. Furthermore, a malicious signature receiver can forge valid batch proxy blind signatures. Therefore, this scheme also does not satisfy the unforgeability of proxy blind signature in the sense. A feasible method to deal with these problems is also discussed in the end.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lin, W D , Jan, J K : A security personal learning tools using a proxy blind signature scheme. In: Proceedings of International Conference on Chinese Language Computing, pp. 273–277. IEEE Press Illinois, USA (2000)

  2. Wang, T Y , Cai, X Q, Zhang, J Z: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

    Google Scholar 

  3. Tan, Z W : An off-line electrnic cash system based on proxy blind signature. Comput. J. 54(4), 505–512 (2011)

    Google Scholar 

  4. Wen, X J , Chen, Y Z , Fang, J B : An inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(1), 549–558 (2013)

    ADS  MATH  MathSciNet  Google Scholar 

  5. Cai, X Q , Wei, C Y : Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(4), 1651–1657 (2013)

    ADS  MATH  MathSciNet  Google Scholar 

  6. Wang, T Y , Cai, X Q , Zhang, J Z : New proxy blind signature scheme based on bilinear pairings. Comput. Appl. 24(2), 130–131 (2007)

    Google Scholar 

  7. Shor, P : Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    MATH  MathSciNet  Google Scholar 

  8. Grover, L K : Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)

    ADS  Google Scholar 

  9. Tian, Y , Chen, H , Yan, G, et al.: A proxy blind signature scheme based on quantum entanglement. Opt. Quant. Electron. doi:10.1007/s11082-013-9753-6

  10. Cao, H J , Zhu, Y Y , Li, P F : A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. doi:10.1007/s10773-013-1826-6

  11. Wang, T Y , Wen, Q Y , Gao, F, et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

    ADS  MATH  Google Scholar 

  12. Gao, F , Qin, S J , Guo, F Z, et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)

    ADS  Google Scholar 

  13. Wang, T. Y., Wen, Q. Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. & Comput. 11(5–6), 434–443 (2011)

    MATH  MathSciNet  Google Scholar 

  14. Gao, F , Qin, S J , Guo, F Z, et al.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)

    ADS  Google Scholar 

  15. Gao, F , Guo, F Z , Wen, Q Y, et al.: Comment on Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101(20), 208901 (2008)

    ADS  Google Scholar 

  16. Zhang, Y S , Li, C F, Guo, G C: Comment on Quantum key distribution without alternative measurements. Phys. Rev. A 63(3), 036301 (2001)

    ADS  Google Scholar 

  17. Gao, F , Qin, S J , Wen, Q Y, et al., et al.: A simple participant attack on the Bradler-Dusek protocol. Quant. Inf. Comput. 7(4), 329–334 (2007)

    MATH  MathSciNet  Google Scholar 

  18. Gao, F , Wen, Q Y , Zhu, F C : Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189–3193 (2008)

    ADS  Google Scholar 

  19. Wang, T Y , Qin, S J , Wen, Q Y, et al. : Analysis and improvement of multiparty controlled quantum secure direct communication protocol. Acta Phys. Sin. 57(12), 7452–7456 (2008)

    Google Scholar 

  20. Wójcik, A : Eavesdropping on the ping-pongquantum communication protocol. Phys. Rev. Lett. 90(15), 2003

    Google Scholar 

  21. Cai, Q Y : The Ping-Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), 109801 (2003)

    ADS  Google Scholar 

  22. Gao, F , Guo, F Z , Wen, Q Y, et al.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77(1), 014302 (2008)

    ADS  Google Scholar 

  23. Gao, F , Qin, S J , Wen, Q Y, et al. : Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger- Horne-Zeilinger state. Opt. Commun 283(1), 192–195 (2010)

    ADS  Google Scholar 

  24. Gisin, N, Fasel, S, Kraus, B, et al.: Trojan-horse attacks on quantumkey-Distribution systems. Phys. Rev. A 73(2), 022320 (2006)

    ADS  Google Scholar 

  25. Deng, F G, Li, X H , Zhou, H Y, et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)

    ADS  MathSciNet  Google Scholar 

  26. Qin, S J , Gao, F , Wen, Q Y, et al.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101–103 (2006)

    ADS  MATH  Google Scholar 

  27. Wang, T Y , Wen, Q Y , Zhu, F C : Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284(6), 1711–1713 (2011)

    ADS  MathSciNet  Google Scholar 

  28. Wang, T Y , Li, Y P : Cryptanalysis of dynamic quantum secret sharing. Quant. Inf. Process. 12(5), 1991–1997 (2013)

    ADS  Google Scholar 

  29. Shi, J J , Shi, R H , Guo, Y, et al.: Batch proxy quantum blind signature scheme. Sci. Chi. Inf. Sci. 56(5), 0521151 (2013)

    MathSciNet  Google Scholar 

  30. Zeng, G H , Keitel, C H : Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    ADS  MathSciNet  Google Scholar 

  31. Yang, Y G , Wen, Q Y : Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chi. Phys. Mech. Astron. 51(8), 1079–1088 (2008)

    MATH  Google Scholar 

  32. Wang, T Y , Wei, Z L : One-time proxy signature based on quantum cryptography. Quant. Inf. Process. 11(2), 455–463 (2012)

    ADS  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61202317, 61272015, 61202367), the Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042), the Young Key Teacher Foundation in Universities of Henan Province (Grant No. 2012GGJS-157), the Natural Science Foundation of Henan Province (Grant No. 132300410316), and the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 13B110150).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Qiu Cai.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Cai, XQ., Zheng, YH. & Zhang, RL. Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme. Int J Theor Phys 53, 3109–3115 (2014). https://doi.org/10.1007/s10773-014-2107-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-014-2107-8

Keywords

Navigation