Abstract
In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However, the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person. Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantum entanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key when he generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone can verify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be public verified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal.
Similar content being viewed by others
References
Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Sci Stat Comput, 1997, 26(5): 1484–1509
Nielson M, Chuang I. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press, 2000
Zeng G H, Ma W P, Wang X M, et al. Signature scheme based on quantum cryptography (in Chinese). Acta Electron Sin, 2001, 29(8): 1098–1100
Zeng G H, Christoph K. An arbitrated quantum signature scheme. Phys Rev A, 2002, 65: 042312
Gottesman D, Chuang I. Quantum digital signature. arXiv: quantph/ 0105032, 2001
Lv X, Feng D G. An arbitrated quantum message signature scheme. CIS, Lecture Notes Comput Sci, 2005, 3314: 1054–1060
Lv X, Feng D G. Quantum digital signature based on quantum one-way functions. arXiv: quant-ph/0403046, 2004
Lee H, Hong C, Kim H, et al. Arbitrated quantum signature scheme with message recovery. Phys Lett A, 2004, 295–300
Wang J, Zhang Q, Liang L M, et al. Comment on: Arbitrated quantum signature scheme with message recovery. Phys Lett A, 2005, 347(4–6): 262–263
Yang Y G, Wen Q Y. Threshold proxy quantum signature scheme with threshold shared verification. Sci China Ser G-Phys Mech Astron, 2008, 51(8): 1079–1088
Zhang X L, Ji D Y. Analysis of a kind of quantum cryptographic schemes based on secret sharing. Sci China Ser G-Phys Mech Astron, 2009, 52(9): 1313–1316
Su Q, Huang Z, Wen Q Y, et al. Quantum blind signature based on twostate vector formalism. Opt Commun, 2010, 283(21): 4408–4410
Zhang X L. One-way quantum identity authentication based on public key. Chin Sci Bull, 2009, 54(12): 2018–2021
Buhrman H, Cleve R, Watrous J, et al. Quantum fingerprinting. Phys Rev Lett, 2001, 87: 167902
Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India. New York: IEEE, 1984. 175–179
Long G L, Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys Rev A, 2002, 65: 032302
Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A, 2003, 68: 042317
Ekert A K. Quantum cryptography based on Bell theorem. Phys Rev Lett, 1991, 67: 661–664
Oppenheim J, Horodecki M. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information. Phys Rev A, 2005, 72: 042309
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhou, J., Zhou, Y., Niu, X. et al. Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828 (2011). https://doi.org/10.1007/s11433-011-4457-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11433-011-4457-z