Skip to main content
Log in

Quantum proxy signature scheme with public verifiability

  • Research Paper
  • Published:
Science China Physics, Mechanics and Astronomy Aims and scope Submit manuscript

Abstract

In recent years, with the development of quantum cryptography, quantum signature has also made great achievement. However, the effectiveness of all the quantum signature schemes reported in the literature can only be verified by a designated person. Therefore, its wide applications are limited. For solving this problem, a new quantum proxy signature scheme using EPR quantum entanglement state and unitary transformation to generate proxy signature is presented. Proxy signer announces his public key when he generates the final signature. According to the property of unitary transformation and quantum one-way function, everyone can verify whether the signature is effective or not by the public key. So the quantum proxy signature scheme in our paper can be public verified. The quantum key distribution and one-time pad encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies strong non-counterfeit and strong non-disavowal.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Sci Stat Comput, 1997, 26(5): 1484–1509

    MathSciNet  MATH  Google Scholar 

  2. Nielson M, Chuang I. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press, 2000

    Google Scholar 

  3. Zeng G H, Ma W P, Wang X M, et al. Signature scheme based on quantum cryptography (in Chinese). Acta Electron Sin, 2001, 29(8): 1098–1100

    Google Scholar 

  4. Zeng G H, Christoph K. An arbitrated quantum signature scheme. Phys Rev A, 2002, 65: 042312

    Article  ADS  Google Scholar 

  5. Gottesman D, Chuang I. Quantum digital signature. arXiv: quantph/ 0105032, 2001

  6. Lv X, Feng D G. An arbitrated quantum message signature scheme. CIS, Lecture Notes Comput Sci, 2005, 3314: 1054–1060

    Google Scholar 

  7. Lv X, Feng D G. Quantum digital signature based on quantum one-way functions. arXiv: quant-ph/0403046, 2004

  8. Lee H, Hong C, Kim H, et al. Arbitrated quantum signature scheme with message recovery. Phys Lett A, 2004, 295–300

  9. Wang J, Zhang Q, Liang L M, et al. Comment on: Arbitrated quantum signature scheme with message recovery. Phys Lett A, 2005, 347(4–6): 262–263

    Article  ADS  Google Scholar 

  10. Yang Y G, Wen Q Y. Threshold proxy quantum signature scheme with threshold shared verification. Sci China Ser G-Phys Mech Astron, 2008, 51(8): 1079–1088

    Article  ADS  MATH  Google Scholar 

  11. Zhang X L, Ji D Y. Analysis of a kind of quantum cryptographic schemes based on secret sharing. Sci China Ser G-Phys Mech Astron, 2009, 52(9): 1313–1316

    Article  ADS  Google Scholar 

  12. Su Q, Huang Z, Wen Q Y, et al. Quantum blind signature based on twostate vector formalism. Opt Commun, 2010, 283(21): 4408–4410

    Article  Google Scholar 

  13. Zhang X L. One-way quantum identity authentication based on public key. Chin Sci Bull, 2009, 54(12): 2018–2021

    Article  Google Scholar 

  14. Buhrman H, Cleve R, Watrous J, et al. Quantum fingerprinting. Phys Rev Lett, 2001, 87: 167902

    Article  ADS  Google Scholar 

  15. Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India. New York: IEEE, 1984. 175–179

    Google Scholar 

  16. Long G L, Liu X S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys Rev A, 2002, 65: 032302

    Article  ADS  Google Scholar 

  17. Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A, 2003, 68: 042317

    Article  ADS  Google Scholar 

  18. Ekert A K. Quantum cryptography based on Bell theorem. Phys Rev Lett, 1991, 67: 661–664

    Article  MathSciNet  ADS  MATH  Google Scholar 

  19. Oppenheim J, Horodecki M. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information. Phys Rev A, 2005, 72: 042309

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to JingXian Zhou.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhou, J., Zhou, Y., Niu, X. et al. Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828 (2011). https://doi.org/10.1007/s11433-011-4457-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11433-011-4457-z

Keywords

Navigation