Abstract
As an important topic of quantum cryptography, quantum proxy blind signature has attracted more and more attentions in recent years. However, with our analysis, it can be seen that there exists a common security loophole in two particular quantum proxy blind signature schemes, i.e., the receiver can forge a valid signature without being caught by others. In order to show that, the detailed attack strategy and the potential improved ideas are proposed in this paper.
Similar content being viewed by others
References
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete loga- rithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)
Grover, L.K.: A fast quantum mechanical algorithm for database search, Twenty- Eighth ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145–195 (2002)
Gottesman, D., Chuang, I.: Quantum digital signature. arXiv:0105032v2 (2001)
Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages, pp 449–458. IEEE Comput. Soc. Press, Washington (2002)
Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)
Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)
Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. Chin. Ser. G: Phys. Mech. Astron. 51(8), 1079–1088 (2008)
Yang, Y.G., Wang, Y., Teng, Y.W.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54, 84 (2010)
Tian, J.H., Zhang, J.Z., Li, Y.P.: A quantum multi-proxy blind signature scheme based on genuine four–qubit entangled state. Int. J. Thero. Phys. 55(2), 809–816 (2016)
Chaum, D., Rivest, R.L., Sherman, A.T.: Blind Signatures for Untraceable Payments[M]// Advances in Cryptology. pp. 199–203. Plenum Publishing (1983)
Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)
Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121–130 (2014)
Shi, W.M., Zhang, J.B., Zhou, Y.H., et al.: A new quantum blind signature with unlinkability. Quantum Inf. Process. 14(8), 3019–3030 (2015)
Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings of the 3rd ACM Conference on Computer and Communications Security, pp. 48–57. New Delhi (1996)
Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)
Cao, H.J., Huang, J., et al.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53, 3095–C3100 (2014)
Xu, G.B.: Novel quantum proxy signature without entanglement. Int. J. Theor. Phys. 54, 2605–C2612 (2015)
Lin, W.D., Jan, J.K.: A security personal learning tools using a proxy blind signature scheme. In: Proceedings of International Conference on Chinese Language Computing, pp 273–277. IEEE Press Illinois, USA (2000)
Tan, Z.W.: An off-line electrnic cash system based on proxy blind signature. Comput. J 54(4), 505–512 (2011)
Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(1), 549–558 (2013)
Shi, J.J., Shi, R.H., Guo, Y., Peng, X.Q., Tang, Y.: Batch proxy quantum blind signature scheme. Sci. China Inf. Sci. 56, 052115:1–052115:9 (2013)
Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 53(2), 419–425 (2014)
Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54, 582–588 (2015)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179. Bangalore (1984)
Ekert, A.K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett 67, 661–663 (1991)
Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53–58 (2006)
Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quant. Inf. Process. 12(8), 2655–2669 (2013)
Liu, G., Ma, W.P., Cao, H., Lu, L.D.: A Novel Quantum Group Proxy Blind Signature Scheme Based on Five-Qubit Entangled State. Int. J. Theor. Phys. https://doi.org/10.1007/s10773-019-04093-9 (2019)
Zhang, L., Sun, H.W., Zhang, K.J., Jia, H.Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quant. Inf. Process. 16(3), 70 (2017)
Zhang, L., Sun, H.W., Zhang, K.J., Wang, Q.L., Cai, X.Q.: The security problems in some novel arbitrated quantum signature protocols. Int. J. Theor. Phys. 54, 2433–C2444 (2017)
Sun, H.W., Zhang, L., Zuo, H.J., Zhang, K.J., Ma, C.G.: Offline arbitrated quantum blind dual-signature protocol with better performance in resisting existential forgery attack. Int. J. Theor. Phys. 57(9), 2695–2708 (2018)
Niu, X.F., Zhang, J.Z., Xie, S.C.: A quantum Multi–Proxy blind signature scheme based on entangled Four-Qubit cluster state. Commun. Theor. Phys. 70, 43–48 (2018)
Acknowledgements
We thank to the support of Heilongjiang Provincial Key Laboratory of the Theory and Computation of Complex Systems. The work is supported by National Natural Science Foundation of China under Grant No. 61802118, Open Foundation of State key Laboratory of Networking and Switching Technology (BUPT) under Grant No. SKLNST-2018-1-07, University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province under Grant No. UNPYSCT-2018015, Natural Science Foundation of Heilongjiang Province under Grant No.JJ2019LH0173, Heilongjiang Postdoctoral Foundation under Grant No.LBH-Z17048 and Heilongjiang University Innovation Fund under Grant No.YJSCX2019-205HLJU.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Zhou, BM., Lin, LD., Wang, W. et al. Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack. Int J Theor Phys 59, 465–473 (2020). https://doi.org/10.1007/s10773-019-04340-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-019-04340-z