Skip to main content
Log in

Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

As an important topic of quantum cryptography, quantum proxy blind signature has attracted more and more attentions in recent years. However, with our analysis, it can be seen that there exists a common security loophole in two particular quantum proxy blind signature schemes, i.e., the receiver can forge a valid signature without being caught by others. In order to show that, the detailed attack strategy and the potential improved ideas are proposed in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete loga- rithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)

    Article  MathSciNet  Google Scholar 

  2. Grover, L.K.: A fast quantum mechanical algorithm for database search, Twenty- Eighth ACM Symposium on Theory of Computing, pp. 212–219 (1996)

  3. Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)

    Article  ADS  Google Scholar 

  4. Gottesman, D., Chuang, I.: Quantum digital signature. arXiv:0105032v2 (2001)

  5. Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages, pp 449–458. IEEE Comput. Soc. Press, Washington (2002)

    Google Scholar 

  6. Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)

    Article  ADS  Google Scholar 

  7. Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)

    Article  ADS  Google Scholar 

  8. Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chin. Ser. G: Phys. Mech. Astron. 51(8), 1079–1088 (2008)

    Article  ADS  Google Scholar 

  9. Yang, Y.G., Wang, Y., Teng, Y.W.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54, 84 (2010)

    Article  ADS  Google Scholar 

  10. Tian, J.H., Zhang, J.Z., Li, Y.P.: A quantum multi-proxy blind signature scheme based on genuine four–qubit entangled state. Int. J. Thero. Phys. 55(2), 809–816 (2016)

    Article  MathSciNet  Google Scholar 

  11. Chaum, D., Rivest, R.L., Sherman, A.T.: Blind Signatures for Untraceable Payments[M]// Advances in Cryptology. pp. 199–203. Plenum Publishing (1983)

  12. Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)

    Article  Google Scholar 

  13. Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121–130 (2014)

    Article  ADS  MathSciNet  Google Scholar 

  14. Shi, W.M., Zhang, J.B., Zhou, Y.H., et al.: A new quantum blind signature with unlinkability. Quantum Inf. Process. 14(8), 3019–3030 (2015)

    Article  ADS  MathSciNet  Google Scholar 

  15. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. New Delhi (1996)

  16. Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)

    Article  ADS  Google Scholar 

  17. Cao, H.J., Huang, J., et al.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53, 3095–C3100 (2014)

    Article  Google Scholar 

  18. Xu, G.B.: Novel quantum proxy signature without entanglement. Int. J. Theor. Phys. 54, 2605–C2612 (2015)

    Article  MathSciNet  Google Scholar 

  19. Lin, W.D., Jan, J.K.: A security personal learning tools using a proxy blind signature scheme. In: Proceedings of International Conference on Chinese Language Computing, pp 273–277. IEEE Press Illinois, USA (2000)

  20. Tan, Z.W.: An off-line electrnic cash system based on proxy blind signature. Comput. J 54(4), 505–512 (2011)

    Article  Google Scholar 

  21. Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(1), 549–558 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  22. Shi, J.J., Shi, R.H., Guo, Y., Peng, X.Q., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56, 052115:1–052115:9 (2013)

    MathSciNet  Google Scholar 

  23. Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 53(2), 419–425 (2014)

    Article  MathSciNet  Google Scholar 

  24. Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54, 582–588 (2015)

    Article  MathSciNet  Google Scholar 

  25. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179. Bangalore (1984)

  26. Ekert, A.K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett 67, 661–663 (1991)

    Article  ADS  MathSciNet  Google Scholar 

  27. Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)

    Article  ADS  Google Scholar 

  28. Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quant. Inf. Process. 12(8), 2655–2669 (2013)

    Article  ADS  MathSciNet  Google Scholar 

  29. Liu, G., Ma, W.P., Cao, H., Lu, L.D.: A Novel Quantum Group Proxy Blind Signature Scheme Based on Five-Qubit Entangled State. Int. J. Theor. Phys. https://doi.org/10.1007/s10773-019-04093-9 (2019)

    Article  ADS  MathSciNet  Google Scholar 

  30. Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quant. Inf. Process. 16(3), 70 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  31. Zhang, L., Sun, H.W., Zhang, K.J., Wang, Q.L., Cai, X.Q.: The security problems in some novel arbitrated quantum signature protocols. Int. J. Theor. Phys. 54, 2433–C2444 (2017)

    Article  Google Scholar 

  32. Sun, H.W., Zhang, L., Zuo, H.J., Zhang, K.J., Ma, C.G.: Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack. Int. J. Theor. Phys. 57(9), 2695–2708 (2018)

    Article  Google Scholar 

  33. Niu, X.F., Zhang, J.Z., Xie, S.C.: A quantum Multi–Proxy blind signature scheme based on entangled Four-Qubit cluster state. Commun. Theor. Phys. 70, 43–48 (2018)

    Article  ADS  MathSciNet  Google Scholar 

Download references

Acknowledgements

We thank to the support of Heilongjiang Provincial Key Laboratory of the Theory and Computation of Complex Systems. The work is supported by National Natural Science Foundation of China under Grant No. 61802118, Open Foundation of State key Laboratory of Networking and Switching Technology (BUPT) under Grant No. SKLNST-2018-1-07, University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province under Grant No. UNPYSCT-2018015, Natural Science Foundation of Heilongjiang Province under Grant No.JJ2019LH0173, Heilongjiang Postdoctoral Foundation under Grant No.LBH-Z17048 and Heilongjiang University Innovation Fund under Grant No.YJSCX2019-205HLJU.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lian-Dong Lin.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhou, BM., Lin, LD., Wang, W. et al. Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack. Int J Theor Phys 59, 465–473 (2020). https://doi.org/10.1007/s10773-019-04340-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-019-04340-z

Keywords

Navigation