Skip to main content
Log in

An E-payment Protocol Based on Quantum Multi-proxy Blind Signature

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

Based on quantum multi-proxy blind signature, a new E-payment protocol is proposed in this paper. Adopting the techniques of quantum key distribution, one-time pad and quantum proxy blind signature, our E-payment protocol could protect user’s anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Additionally, the quantum operation can be transmitted successfully with the probability 1, which can make the protocol reliable and practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chaum, D.: Blind signature for untraceable payments. Advances in cryptology. In: Proceeding of Crypto82, pp. 199–203. Springer, New York (1983)

  2. Chaum, D., Heyst, E.: Group Signatures, Advances in Cryptology-Eurocrypt91. LNCS 547, pp. 257–265. Springer, Berlin (1991)

    MATH  Google Scholar 

  3. Maitland, G., Boyd, C.: Fair Electronic Cash Based on a Group Signature Scheme, ICICS 2001, LNCS 2229, pp. 461–465. Springer, Berlin (2001)

    MATH  Google Scholar 

  4. Canard, S., Traor J.: On Fair E-cash Systems Based on Group Signature Schemes, ACISP 2003, LNCS 2727, pp. 237–248. Springer, Berlin (2003)

  5. Traor, J.: Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems, ACISP99 LNCS 1587, pp. 228–243. Springer, Berlin (1999)

    Google Scholar 

  6. Qiu, W., Chen, K., Gu, D.: A New Off-Line Privacy Protecting E-Cash System with Revocable Anonymity, ISC 2002, LNCS 2433, pp. 177–190. Springer, Berlin (2002)

    Google Scholar 

  7. William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, New York (2003)

    Google Scholar 

  8. Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)

    Article  Google Scholar 

  9. Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)

    Article  Google Scholar 

  10. Lysyanskaya, A., Ramzan, Z.: Group blind digital signature: a scalable solution to electronic cash. In: Proceedings of the 2nd Financial Cryptography Conference (1998)

  11. Mohammed, E., Emarah, A.E., El-Shennawy, K.: Information Systems for Enhanced Public Safety and Security, 33 (2000)

  12. Chien, H., Jan, J., Tseng, Y.: Eighth international conference on parallel and distributed systems (ICPADS01) 44 (2001)

  13. Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654 (2011)

    Article  ADS  Google Scholar 

  14. Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with chi-type entangled states. Int. J. Theor. Phys. 51, 455–461 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  15. Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Thero. Phys. 55(5), 2303–2310 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  16. Wen, X.J., Nie, Z.: An E-payment system based on quantum blind and group signature. Physica Scripta. 82(6), 5468–5478 (2010)

    Google Scholar 

  17. Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum. Inf. Process. 12(1), 549–558 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  18. Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum. Inf. Process. 12(4), 1651–1657 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  19. Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

    Google Scholar 

  20. Cao, F., Cao, Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)

    Article  MathSciNet  MATH  Google Scholar 

  21. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  ADS  Google Scholar 

  22. Mayers, D.: Unconditional security in quantum cryptography. J. Assoc.: Comput. Math 48(1), 351–406 (2001)

    MathSciNet  MATH  Google Scholar 

  23. Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)

    Article  ADS  Google Scholar 

  24. Xia, Z.H., Wang, X.H., Zhang, L.G.: A Privacy-preserving and Copy-deterrence Content-based Image Retrieval Scheme in Cloud Computing[J]. 1–1 (2016)

  25. Wang, T.Y., Wei, Z.L.: Analysis of forgery attack on one-time proxy signature and the improvement. Int. J. Theor. Phys. 55, 743–745 (2016)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  26. Guo, P., Wang, J., Geng, X.H.: A variable threshold-value authentication for wireless mesh networks. Journal of Internet Technology 15(6), 929–936 (2014)

    Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61402275, 61402015, 61273311), the Natural Science Foundation of Shaanxi Province (Grant Nos. 2015JM6263, 2016JM6069), and the Fundamental Research Funds for the Central Universities (Grant No. GK201402004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Zhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shao, AX., Zhang, JZ. & Xie, SC. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature. Int J Theor Phys 56, 1241–1248 (2017). https://doi.org/10.1007/s10773-016-3266-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-016-3266-6

Keywords

Navigation