A Novel Quantum Proxy Blind Signature Scheme
- 160 Downloads
- 1 Citations
Abstract
A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie’s delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.
Keywords
Quantum cryptography Quantum signature scheme Proxy signature Blind signatureNotes
Acknowledgments
This work was supported by the National Natural Science Foundation of China (Grant Nos. 61273311 and 61402275), the Natural Science Basic Research Plan of Shaanxi Province of China (Grant No. 2015JM6263), the Special Foundation for Basic Research Funding of the Central Higher Education of China (Grant No. GK201402004).
References
- 1.Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)Google Scholar
- 2.Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)ADSMathSciNetCrossRefMATHGoogle Scholar
- 3.Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)ADSMathSciNetCrossRefMATHGoogle Scholar
- 4.Boykin, P.O., Boychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)ADSCrossRefGoogle Scholar
- 5.Oppenheim, J., Horodecki, M.: How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information. Phys. Rev. A 72, 042309 (2005)ADSCrossRefGoogle Scholar
- 6.Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18, 3189–3192 (2009)ADSCrossRefGoogle Scholar
- 7.Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282, 3382–3385 (2009)ADSCrossRefGoogle Scholar
- 8.Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)ADSMathSciNetCrossRefGoogle Scholar
- 9.Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the singleparticle quantum state to encode the information. Quantum Inf. Process. 12, 365–380 (2013)Google Scholar
- 10.Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state. Quantum Inf. Process. 12, 1299–1306 (2013)ADSCrossRefMATHGoogle Scholar
- 11.Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication using the Einstein-podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRefGoogle Scholar
- 12.Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADSCrossRefGoogle Scholar
- 13.Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)ADSCrossRefGoogle Scholar
- 14.Wang, J., Zhang, Q., Tang, C.J.: Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 266, 732–737 (2006)ADSCrossRefGoogle Scholar
- 15.Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)ADSCrossRefGoogle Scholar
- 16.Curty, M., Lütkenhaus, N.: Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 77, 046301 (2008)Google Scholar
- 17.Zeng, G.H.: Reply to Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 78, 016301 (2008)Google Scholar
- 18.Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 321, 295–300 (2004)ADSMathSciNetCrossRefMATHGoogle Scholar
- 19.Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 347, 262–263 (2005)Google Scholar
- 20.Wen, X.J., Liu, Y.: A realizable quantum sequential multi-signature scheme. Acta Electron. Sin. 35, 1079–1083 (2007)Google Scholar
- 21.Wen, X.J., Liu, Y., Zhou, N.R.: Realizable quantum broadcasting multi-signature scheme. Int. J. Mod. Phys. B 22, 4251–4259 (2008)ADSMathSciNetCrossRefMATHGoogle Scholar
- 22.Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)ADSCrossRefMATHGoogle Scholar
- 23.Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology Proceedings of Crypto’82, pp 199–203. Springer-Verlag (1983)Google Scholar
- 24.Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666–669 (2009)ADSCrossRefGoogle Scholar
- 25.Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6, 5051–5053 (2011)MathSciNetGoogle Scholar
- 26.Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)ADSCrossRefGoogle Scholar
- 27.He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21, 030306 (2012)ADSCrossRefGoogle Scholar
- 28.Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)CrossRefGoogle Scholar
- 29.Cai, X.Q., Niu, H.F.: Partially blind signature based on quantum cryptography. Int. J. Mod. Phys. B 26, 1250163 (2012)ADSCrossRefMATHGoogle Scholar
- 30.Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1338–1354 (1996)Google Scholar
- 31.Cao, H.J., Huang, J., Yu, Y.F., Jiang, X.L.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53, 3095–3100 (2014)CrossRefMATHGoogle Scholar
- 32.Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)ADSCrossRefGoogle Scholar
- 33.Zou, X., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRefGoogle Scholar
- 34.Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)ADSMathSciNetCrossRefGoogle Scholar
- 35.Hwang, T., Luo, Y.P., Chong, S.K.: Comment on Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 85, 056301 (2012)Google Scholar
- 36.Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54, 582–588 (2015)MathSciNetCrossRefMATHGoogle Scholar
- 37.Su, Q., Li, W.M.: Improved group signature scheme based on quantum teleportation. Int. J. Theor. Phys. 53, 1208–1216 (2014)MathSciNetCrossRefMATHGoogle Scholar
- 38.Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on Experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection. Phys. Rev. Lett. 101, 208901 (2008)Google Scholar
- 39.Tian, Y., Chen, H., Ji, S.F., Han, Z.P., Lian, H.G., Wen, X.J.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quant. Electron. 46, 769–777 (2014)CrossRefGoogle Scholar
- 40.Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62a, 147–151 (2007)ADSMATHGoogle Scholar
- 41.Zuo, H.J., Zhang, K.J., Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process 12, 2343–2353 (2013)ADSMathSciNetCrossRefMATHGoogle Scholar
- 42.Zhang, W., Qiu, D.W., Zou, X.F.: Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation. Quantum Inf. Process 15, 2499–2519 (2016)ADSMathSciNetCrossRefMATHGoogle Scholar
- 43.Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 53, 419–425 (2014)CrossRefMATHGoogle Scholar
- 44.Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54, 1325–1333 (2015)MathSciNetCrossRefMATHGoogle Scholar