International Journal of Theoretical Physics

, Volume 56, Issue 5, pp 1708–1718 | Cite as

A Novel Quantum Proxy Blind Signature Scheme

Article

Abstract

A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie’s delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.

Keywords

Quantum cryptography Quantum signature scheme Proxy signature Blind signature 

Notes

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61273311 and 61402275), the Natural Science Basic Research Plan of Shaanxi Province of China (Grant No. 2015JM6263), the Special Foundation for Basic Research Funding of the Central Higher Education of China (Grant No. GK201402004).

References

  1. 1.
    Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)Google Scholar
  2. 2.
    Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)ADSMathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)ADSMathSciNetCrossRefMATHGoogle Scholar
  4. 4.
    Boykin, P.O., Boychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)ADSCrossRefGoogle Scholar
  5. 5.
    Oppenheim, J., Horodecki, M.: How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information. Phys. Rev. A 72, 042309 (2005)ADSCrossRefGoogle Scholar
  6. 6.
    Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18, 3189–3192 (2009)ADSCrossRefGoogle Scholar
  7. 7.
    Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282, 3382–3385 (2009)ADSCrossRefGoogle Scholar
  8. 8.
    Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)ADSMathSciNetCrossRefGoogle Scholar
  9. 9.
    Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the singleparticle quantum state to encode the information. Quantum Inf. Process. 12, 365–380 (2013)Google Scholar
  10. 10.
    Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state. Quantum Inf. Process. 12, 1299–1306 (2013)ADSCrossRefMATHGoogle Scholar
  11. 11.
    Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication using the Einstein-podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)ADSCrossRefGoogle Scholar
  12. 12.
    Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)ADSCrossRefGoogle Scholar
  13. 13.
    Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)ADSCrossRefGoogle Scholar
  14. 14.
    Wang, J., Zhang, Q., Tang, C.J.: Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 266, 732–737 (2006)ADSCrossRefGoogle Scholar
  15. 15.
    Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)ADSCrossRefGoogle Scholar
  16. 16.
    Curty, M., Lütkenhaus, N.: Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 77, 046301 (2008)Google Scholar
  17. 17.
    Zeng, G.H.: Reply to Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 78, 016301 (2008)Google Scholar
  18. 18.
    Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 321, 295–300 (2004)ADSMathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 347, 262–263 (2005)Google Scholar
  20. 20.
    Wen, X.J., Liu, Y.: A realizable quantum sequential multi-signature scheme. Acta Electron. Sin. 35, 1079–1083 (2007)Google Scholar
  21. 21.
    Wen, X.J., Liu, Y., Zhou, N.R.: Realizable quantum broadcasting multi-signature scheme. Int. J. Mod. Phys. B 22, 4251–4259 (2008)ADSMathSciNetCrossRefMATHGoogle Scholar
  22. 22.
    Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)ADSCrossRefMATHGoogle Scholar
  23. 23.
    Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology Proceedings of Crypto’82, pp 199–203. Springer-Verlag (1983)Google Scholar
  24. 24.
    Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666–669 (2009)ADSCrossRefGoogle Scholar
  25. 25.
    Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6, 5051–5053 (2011)MathSciNetGoogle Scholar
  26. 26.
    Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)ADSCrossRefGoogle Scholar
  27. 27.
    He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21, 030306 (2012)ADSCrossRefGoogle Scholar
  28. 28.
    Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)CrossRefGoogle Scholar
  29. 29.
    Cai, X.Q., Niu, H.F.: Partially blind signature based on quantum cryptography. Int. J. Mod. Phys. B 26, 1250163 (2012)ADSCrossRefMATHGoogle Scholar
  30. 30.
    Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1338–1354 (1996)Google Scholar
  31. 31.
    Cao, H.J., Huang, J., Yu, Y.F., Jiang, X.L.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53, 3095–3100 (2014)CrossRefMATHGoogle Scholar
  32. 32.
    Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)ADSCrossRefGoogle Scholar
  33. 33.
    Zou, X., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)ADSCrossRefGoogle Scholar
  34. 34.
    Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)ADSMathSciNetCrossRefGoogle Scholar
  35. 35.
    Hwang, T., Luo, Y.P., Chong, S.K.: Comment on Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 85, 056301 (2012)Google Scholar
  36. 36.
    Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54, 582–588 (2015)MathSciNetCrossRefMATHGoogle Scholar
  37. 37.
    Su, Q., Li, W.M.: Improved group signature scheme based on quantum teleportation. Int. J. Theor. Phys. 53, 1208–1216 (2014)MathSciNetCrossRefMATHGoogle Scholar
  38. 38.
    Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on Experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection. Phys. Rev. Lett. 101, 208901 (2008)Google Scholar
  39. 39.
    Tian, Y., Chen, H., Ji, S.F., Han, Z.P., Lian, H.G., Wen, X.J.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quant. Electron. 46, 769–777 (2014)CrossRefGoogle Scholar
  40. 40.
    Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62a, 147–151 (2007)ADSMATHGoogle Scholar
  41. 41.
    Zuo, H.J., Zhang, K.J., Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process 12, 2343–2353 (2013)ADSMathSciNetCrossRefMATHGoogle Scholar
  42. 42.
    Zhang, W., Qiu, D.W., Zou, X.F.: Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation. Quantum Inf. Process 15, 2499–2519 (2016)ADSMathSciNetCrossRefMATHGoogle Scholar
  43. 43.
    Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 53, 419–425 (2014)CrossRefMATHGoogle Scholar
  44. 44.
    Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54, 1325–1333 (2015)MathSciNetCrossRefMATHGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  1. 1.College of Mathematics and Information ScienceShaanxi Normal UniversityXi’anChina
  2. 2.College of ScienceXi’an University of Posts and TelecommunicationsXi’anChina

Personalised recommendations