Skip to main content
Log in

Multi-proxy Strong Blind Quantum Signature Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

A multi-proxy strong blind quantum signature scheme is proposed in this paper. An original signatory Alice delegates her signing authority to a group of proxy signatories by using a classical warrant. A blind factor is introduced by a sender U to blind a message, and the proxy signatories sign the message blindly via applying appropriate unitary operators. A receiver Bob verifies the generated signature with the help of an arbitrator Trent. The security of this scheme is based on a quantum key distribution protocol, a quantum one-time pad and other quantum properties. It is proved that our scheme has the properties of non-disavowal, non-counterfeit, multi-proxy, blindness, untraceability and can resist some common attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp 175–179 (1984)

  2. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett 67, 661–663 (1991)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  3. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett 68, 3121–3124 (1992)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  4. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  5. Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12, 365–380 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  6. Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state. Quantum Inf. Process. 12, 1299–1306 (2013)

    Article  ADS  MATH  Google Scholar 

  7. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18, 3189–3192 (2009)

    Article  ADS  Google Scholar 

  8. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun 282, 3382–3385 (2009)

    Article  ADS  Google Scholar 

  9. Boykin, P.O., Boychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)

    Article  ADS  Google Scholar 

  10. Mosca, M., Tapp, A., Wolf, Rde: Private quantum channels and the cost of randomizing quantum information arXiv:quant-ph/0003101v2 (2000)

  11. Leung, D.W.: Quantum vernam cipher arXiv:quant-ph/0012077v4 (2001)

  12. Gottesman, D., Chuang, I. L.: Quantum digital signature arXiv:quant-ph/0105032v2 (2001)

  13. Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)

    Article  ADS  MathSciNet  Google Scholar 

  14. Zeng, G.H.: Reply to Comment on ‘Arbitrated quantum-signature scheme’. Phys. Rev. A 78, 016301 (2008)

    Article  ADS  MathSciNet  Google Scholar 

  15. Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295–300 (2004)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  16. Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr 81, 055001 (2010)

    Article  ADS  MATH  Google Scholar 

  17. Tian, Y., Chen, H., Ji, S.F., Han, Z.P., Lian, H.G., Wen, X.J.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quant. Electron 46, 769–777 (2014)

    Article  Google Scholar 

  18. Tian, Y., Chen, H., Yan, G., Tian, J.F., Wen, X.J.: A proxy blind signature scheme based on quantum entanglement. Opt. Quant. Electron 45, 1297–1305 (2013)

    Article  Google Scholar 

  19. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1338–1354 (1996)

    Google Scholar 

  20. Cao, H.J., Huang, J., Yu, Y.F., Jiang, X.L.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys 53, 3095–3100 (2014)

    Article  MATH  Google Scholar 

  21. Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)

    Article  ADS  Google Scholar 

  22. Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 0415 (2008)

    Article  ADS  Google Scholar 

  23. Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology Proceedings of Crypto’82, pp 199–203. Springer-Verlag (1983)

  24. Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun 282, 666–669 (2009)

    Article  ADS  Google Scholar 

  25. Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci 6, 5051–5053 (2011)

    MathSciNet  Google Scholar 

  26. Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)

    Article  ADS  Google Scholar 

  27. He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21, 030306 (2012)

    Article  ADS  Google Scholar 

  28. Cai, X.Q., Niu, H.F.: Partially blind signature based on quantum cryptography. Int. J. Mod. Phys. B 26, 1250163 (2012)

    Article  ADS  MATH  Google Scholar 

  29. Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)

    Article  Google Scholar 

  30. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication using the Einstein-podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    Article  ADS  Google Scholar 

  31. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

  32. Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett 21, 601–603 (2004)

    Article  ADS  Google Scholar 

  33. Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)

    Article  ADS  Google Scholar 

  34. Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  35. Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82 (2010)

  36. Hwang, T., Luo, Y.P., Chong, S.K.: Comment on Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 85, 056301 (2012)

    Article  ADS  Google Scholar 

  37. Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)

    Article  ADS  Google Scholar 

  38. Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys 54, 582–588 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  39. Su, Q., Li, W.M.: Improved group signature scheme based on quantum teleportation. Int. J. Theor. Phys 53, 1208–1216 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  40. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on Experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection. Phys. Rev. Lett 101, 208901 (2008)

    Article  ADS  Google Scholar 

  41. Sun, Z.W., Du, R.G., Wang, B.H., Long, D.Y.: Improving the security of the arbitrated quantum signature protocols arXiv:quant-ph/1107.2459v2 (2011)

  42. Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank e-payment protocol based on quantum proxy weak blind signature. Quantum Inf. Process. 12, 549–558 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  43. Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys 53, 419–425 (2014)

    Article  MATH  Google Scholar 

  44. Tian, J.H., Zhang, J.Z., Li, Y.P.: A quantum multi-proxy blind signature scheme based on genuine four-qubit entangled state. Int. J. Theor. Phys 55, 809–816 (2016)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant No. 61402275), the Special Foundation for Basic Research Funding of the Central Higher Education of China (Grant No. GK201402004), the Natural Science Basic Research Plan of Shaanxi Province of China (Grant No. 2015JM6263).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Zhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, W., Zhang, JZ., Li, YP. et al. Multi-proxy Strong Blind Quantum Signature Scheme. Int J Theor Phys 55, 3524–3536 (2016). https://doi.org/10.1007/s10773-016-2979-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-016-2979-x

Keywords

Navigation