Abstract
We present a quantum signature scheme using a single qubit rotation operator. In this protocol, the trusted center confirms the quantum signature and thus conforms with other quantum signature schemes. Utilizing the unitary properties of a single qubit rotation operator and Pauli operators, our protocol provides signature security and enhances the efficiency of communication. In addition, our protocol – using only a single qubit measurement – facilitates the ease of implementation and enhances convenience for users. The security of the protocol is analyzed.
Similar content being viewed by others
References
Shor, P.W.: Proceedings of 35nd annual symposium on foundations of computer science. IEEE Comput. Soc. Press. 124–134 (1994).
Shor, P.W.: SIAM J. Comput. 26(5), 1484–1509 (1997).
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Mod. Phys. 74, 145 (2002).
Dirac, P.: Principles of Quantum Mechanics. Oxford University Press, Oxford (1999).
Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers. Syst. Signal Process. 175 (1984).
Ekert, AK.: Phys. Rev. Lett. 67, 661–663 (1991).
Bennett, C.H.: Phys. Rev. Lett. 68, 3121–3124 (1992).
Bennett, C.H., Brassard, G., Mermin, N.D.: Phys. Rev. Lett. 68, 557–559 (1992).
Hong, C.H., Heo, J.O., Khym, G.L., Lim, J.I., Hong, S.K., Yang, H.J.: Opt. Commun. 283, 2644–2646 (2010).
Bostrom, K., Felbinger, T.: Phys. Rev. Lett. 89, 187902 (2002).
Hong, C.H., Lim, J.I., Kim, J.I., Yang, H.J.: J. Korean Phys. Soc. 56, 1733–1737 (2010).
Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Chin. Phys. Lett. 29, 050303 (2012).
Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: J. Korean Phys. Soc. 61(1), 1–5 (2012).
Jino, H., Hong, C.H., Lim, J.I., Yang, H.J.: Chinese Phys. Lett. 30, 040301 (2013).
Hillery, M., Buzek, V., Berhiaume, A: Phys. Rev. A 59, 1829–1834 (1999).
Gottesman, D., Chuang, I.L.: e-print arXiv: 0105032.
Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages. IEEE Computer Society Press, Washington DC (2002).
Zeng, G.H., Keitel, C.H.: Phys. Rev. A 65, 042312 (2002).
Curty, M., Lütkenhaus, N.: Phys. Rev. A 77, 046301 (2008).
Zeng, G.H.: Phys. Rev. A 78, 016301 (2008).
Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Phys. Lett. A 321, 295 (2004).
Wang, J., Zhang, Q., Liang, L. M., Tang, C. J.: Phys. Lett. A 347, 262 (2005).
Li, Q., Chan, W. H., Long, D. Y.: Phys. Rev. A 79, 054307 (2009).
Zou, X., Qiu, D.: Phys. Rev. A 84, 042325 (2010).
Yang, Y.G., Wen, Q.Y.: Sci. Chin. Ser. G. Phys. Mech. Astron. 51, 1079–1088 (2008).
Wang, T.Y., Wei, Z.L.: Quantum Inf. Proc. 11, 455–463 (2012).
Shi, J.H., Zhang, S.L., Chang, Z.G.: Sci. China Phys. Mech. Astron. 56(3), 519–523 (2013).
Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: Phys. Scr. 81, 055001 (2010).
Wen, X.J.: Phys. Scr. 82, 065403 (2010).
Xu, R., Huang, L.S., Yang, W., He, L.B.: Opt. Commun. 284, 3654–3658 (2011).
Wang, T.Y., Wen, Q.Y.: Chin. Phys. B. 19, 060307 (2010).
Wen, X.J., Niu, X. M., Ji, L.P., Tian, Y.: Opt. Commun. 282, 666–669 (2009).
Yang, Y.G.: Chin. Phys. B. 17, 415 (2008).
Yang, Y.G., Wang, Y., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Commun. Theor. Phys. 54, 84 (2010).
Leung, D.W. Quantum Inf. Comput. 2(1), 14–34 (2002).
Boykin, P.O., Roychowdhury, V.: Phys. Rev. A 67, 042317 (2003).
Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Phys. Rev. A 84, 022344 (2011).
Choi, J.W., Chang, K.Y., Hong, D.: Phys. Rev. A 84, 062330 (2011).
Zhang, K.J., Zhang, W.W., Li, D.: Quantum Inf. Process. 12, 2655–2669 (2013).
Zhang, K.J., Qin, S.J., Sun, Y., Song, T.T., Su, Q.: Quantum Inf. Process. 12, 3127–3141 (2013).
Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Eur. Phys. J. D. 61, 773–778 (2011).
Liu, F., Zhang, K., Cao, T.: Int. J. Theor. Phys. 53, 277–288 (2014).
Dumais, P., Mayers, D., Salvail, L.: In: Advances in Cryptology-Eurocrypt 2000. LNSC, vol. 1807. Springer, Berlin (2000).
Crepeau, C., Legare, F., Salvail, L.: In: Proc. Euro. Advances in Cryptology, pp. 60–77, 2001.
Kawachi, A, Kobayashi, H., Koshiba, T., Putra, R.H.: Theor. Comput. Sci. 345, 370–385 (2005).
Kashefi, E., Kerenidis, I.: Theor. Comput. Sci. 378(1), 101–116 (2007).
Nikolopoulos, G.M.: Phys. Rev. A 77, 032348 (2008).
Wu, Y., Yang, L.: In: Proceedings of the 2009 5th International Conference on Information Assurance and Security, vol. 1, pp. 540–543, 2009.
Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Int. J. Theor. Phys. 51, 912–924 (2012).
Nielsen, M.A, Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000).
Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Int. J. Theor. Phys. 51, 2135–2142 (2012).
Yang, L., Wu, L.A, Liu, S.: Proceedings of Quantum Optics in Computing and Communication, SPIE Press, vol. 4917, pp. 106–111, 2002.
Kak, S.: Found. Phys. Lett. 19(3), 293–296 (2006).
Menezes, AJ., van Oorschot, P.C., Vantone, S.A: Handbook of Applied Cryptography. CRC Press (1996).
Forouzan, B.A: Cryptography and Network Security. Mcgraw Hill International Edition 2008.
Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Chin. Phys. Lett. 25(5), 15–61 (2008).
Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Phys. Rev. Lett. 87, 167902 (2001).
Gao, F., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Sci. China Phys. Mech. Astron. 52(12), 1925–1931 (2009).
Nikolopoulos, G.M.: Phys. Rev. A 78, 019903 (2008).
Nikolopoulos, G.M., Ioannou, L.M.: Phys. Rev. A 79, 042327 (2009).
Seyfarth, U., Nikolopoulos, G.M., Alber, G.: Phys. Rev. A 85, 022342 (2009).
Acknowledgments
This research was supported by the research foundation of Korea University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kang, MS., Hong, CH., Heo, J. et al. Quantum Signature Scheme Using a Single Qubit Rotation Operator. Int J Theor Phys 54, 614–629 (2015). https://doi.org/10.1007/s10773-014-2254-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-014-2254-y