Abstract
The security of the recent quantum multi-signature protocol based on teleportation is analyzed. We show that there are some security vulnerabilities in the protocol. The detailed attack strategies are described from the aspect of participant attack. We also point out that the protocol is not secure against external attack. Finally, we give some possible countermeasures to improve the protocol.
Similar content being viewed by others
References
Zeng, G., Christoph, K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)
Li, Q., Chan, W., Long, D.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)
Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295 (2004)
Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum. Inform. 5, 553 (2007)
Yang, Y.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)
Chien, H., Jan, J., Tseng, Y.: RSA-based partially blind signature with low computation. In: Eighth International Conference on Parallel and Distributed Systems (ICPADS01) 44, 385 (2001)
Wang, T., Wei, Z.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11, 455 (2012)
Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. Chin. Phys. Mech. Astron. 54, 1828 (2011)
Wen, X., Tian, Y., Ji, L., Niu, X.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)
Wen, X.: An E-payment system based on quantum group signature. Phys. Scr. 82, 065403 (2010)
Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654 (2011)
Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)
Wen, X., Chen, Y., Fang, J.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. doi: 10.1007/s11128-012-0398-3
Wen, X., Niu, X., Ji, L., Yuan, T.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666 (2009)
Wang, T., Wen, Q.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)
Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. 62a, 147 (2007)
Wen, X., Liu, Y., Zhou, N.: Realizable quantum broadcasting multi-signature scheme. Int. J. Mod. Phys. B 22, 4251 (2008)
Ma, Y., Tian, W., Fan, Y.: A controllable quantum sequential multi-signature scheme. In: ICTMF 2011, CCIS 164, pp. 40–45 (2011)
Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5, 41 (2005)
Gao, F., Guo, F., Wen, Q., Zhu, F.: Comment on “Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection”. Phys. Rev. Lett. 101, 208901 (2008)
Zhang, Y., Li, C., Guo, G.: Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)
Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)
Wang, T., Wen, Q., Chen, X.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283, 5261 (2010)
Gao, F., Wen, Q., Zhu, F.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17, 3189 (2008)
Wang, T., Wen, Q., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373, 65 (2008)
Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quant. Electron. 47, 630 (2011)
Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. Chin. Phys. Mech. Astron. 53, 491 (2010)
Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)
Wójcik, A.: Eavesdropping on the “Ping-Pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)
Wójcik, A.: Comment on “Quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)
Cai, Q.: The Ping–Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)
Gao, F., Guo, F., Wen, Q., Hu, F.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)
Gao, F., Wen, Q., Zhu, F.: Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748 (2007)
Gao, F., Lin, S., Wen, Q., Zhu, F.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)
Gao, F., Qin, S., Wen, Q., Zhu, F.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)
Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)
Deng, F., Li, X., Zhou, H., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)
Wang, T., Wen, Q.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11, 0434 (2011)
Wang, T., Wen, Q., Zhu, F.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284, 1711 (2011)
Gao, F., Qin, S., Guo, F., Wen, Q.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)
Acknowledgments
This work is supported by NSFC (Grant Nos. 61272057, 61202434, 61170270, 61100203, 61003286, 61121061, 11071056, 11101229), NCET (Grant No. NCET-10-0260), Beijing Natural Science Foundation (Grant Nos. 4112040, 4122054), the Fundamental Research Funds for the Central Universities (Grant No. 2012RC0612, 2011YB01), Science Foundation of Hebei Education Department(Grant No. 2010146).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zuo, H., Zhang, K. & Song, T. Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf Process 12, 2343–2353 (2013). https://doi.org/10.1007/s11128-013-0524-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-013-0524-x