Skip to main content
Log in

Security analysis of quantum multi-signature protocol based on teleportation

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

The security of the recent quantum multi-signature protocol based on teleportation is analyzed. We show that there are some security vulnerabilities in the protocol. The detailed attack strategies are described from the aspect of participant attack. We also point out that the protocol is not secure against external attack. Finally, we give some possible countermeasures to improve the protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zeng, G., Christoph, K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)

    Article  ADS  Google Scholar 

  2. Li, Q., Chan, W., Long, D.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  3. Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295 (2004)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  4. Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum. Inform. 5, 553 (2007)

    Article  MATH  Google Scholar 

  5. Yang, Y.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)

    Article  ADS  Google Scholar 

  6. Chien, H., Jan, J., Tseng, Y.: RSA-based partially blind signature with low computation. In: Eighth International Conference on Parallel and Distributed Systems (ICPADS01) 44, 385 (2001)

  7. Wang, T., Wei, Z.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11, 455 (2012)

    Article  MathSciNet  ADS  Google Scholar 

  8. Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. Chin. Phys. Mech. Astron. 54, 1828 (2011)

    Article  ADS  Google Scholar 

  9. Wen, X., Tian, Y., Ji, L., Niu, X.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)

    Article  ADS  Google Scholar 

  10. Wen, X.: An E-payment system based on quantum group signature. Phys. Scr. 82, 065403 (2010)

    Article  Google Scholar 

  11. Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654 (2011)

    Article  ADS  Google Scholar 

  12. Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with \(\chi \)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  13. Wen, X., Chen, Y., Fang, J.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. doi: 10.1007/s11128-012-0398-3

  14. Wen, X., Niu, X., Ji, L., Yuan, T.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666 (2009)

    Article  ADS  Google Scholar 

  15. Wang, T., Wen, Q.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)

    Article  ADS  Google Scholar 

  16. Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. 62a, 147 (2007)

    Google Scholar 

  17. Wen, X., Liu, Y., Zhou, N.: Realizable quantum broadcasting multi-signature scheme. Int. J. Mod. Phys. B 22, 4251 (2008)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  18. Ma, Y., Tian, W., Fan, Y.: A controllable quantum sequential multi-signature scheme. In: ICTMF 2011, CCIS 164, pp. 40–45 (2011)

  19. Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5, 41 (2005)

    MathSciNet  Google Scholar 

  20. Gao, F., Guo, F., Wen, Q., Zhu, F.: Comment on “Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection”. Phys. Rev. Lett. 101, 208901 (2008)

    Article  ADS  Google Scholar 

  21. Zhang, Y., Li, C., Guo, G.: Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61, 052312 (2000)]. Phys. Rev. A 63, 036301 (2001)

    Article  MathSciNet  ADS  Google Scholar 

  22. Gao, F., Qin, S., Wen, Q., Zhu, F.: A simple participant attack on the Bradler–Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)

    MathSciNet  MATH  Google Scholar 

  23. Wang, T., Wen, Q., Chen, X.: Cryptanalysis and improvement of a multi-user quantum key distribution protocol. Opt. Commun. 283, 5261 (2010)

    Article  ADS  Google Scholar 

  24. Gao, F., Wen, Q., Zhu, F.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17, 3189 (2008)

    Article  ADS  Google Scholar 

  25. Wang, T., Wen, Q., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373, 65 (2008)

    Article  ADS  MATH  Google Scholar 

  26. Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quant. Electron. 47, 630 (2011)

    Article  ADS  Google Scholar 

  27. Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. Chin. Phys. Mech. Astron. 53, 491 (2010)

    Article  ADS  Google Scholar 

  28. Qin, S., Gao, F., Wen, Q., Zhu, F.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)

    Article  ADS  MATH  Google Scholar 

  29. Wójcik, A.: Eavesdropping on the “Ping-Pong” quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)

    Article  ADS  Google Scholar 

  30. Wójcik, A.: Comment on “Quantum dense key distribution”. Phys. Rev. A 71, 016301 (2005)

    Article  ADS  Google Scholar 

  31. Cai, Q.: The Ping–Pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)

    Article  ADS  Google Scholar 

  32. Gao, F., Guo, F., Wen, Q., Hu, F.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)

    Article  ADS  Google Scholar 

  33. Gao, F., Wen, Q., Zhu, F.: Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748 (2007)

    Article  ADS  Google Scholar 

  34. Gao, F., Lin, S., Wen, Q., Zhu, F.: A special eavesdropping on one-sender versus N-receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)

    Article  ADS  Google Scholar 

  35. Gao, F., Qin, S., Wen, Q., Zhu, F.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger–Horne–Zeilinger state. Opt. Commun. 283, 192 (2010)

    Article  ADS  Google Scholar 

  36. Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)

    Article  ADS  Google Scholar 

  37. Deng, F., Li, X., Zhou, H., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)

    Article  ADS  Google Scholar 

  38. Wang, T., Wen, Q.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11, 0434 (2011)

    MathSciNet  Google Scholar 

  39. Wang, T., Wen, Q., Zhu, F.: Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 284, 1711 (2011)

    Article  ADS  Google Scholar 

  40. Gao, F., Qin, S., Guo, F., Wen, Q.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

This work is supported by NSFC (Grant Nos. 61272057, 61202434, 61170270, 61100203, 61003286, 61121061, 11071056, 11101229), NCET (Grant No. NCET-10-0260), Beijing Natural Science Foundation (Grant Nos. 4112040, 4122054), the Fundamental Research Funds for the Central Universities (Grant No. 2012RC0612, 2011YB01), Science Foundation of Hebei Education Department(Grant No. 2010146).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Huijuan Zuo.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zuo, H., Zhang, K. & Song, T. Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf Process 12, 2343–2353 (2013). https://doi.org/10.1007/s11128-013-0524-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-013-0524-x

Keywords

Navigation