Abstract
Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency. Unfortunately, it is not secure against proxy attacks and forgery attack. In this paper, first, the proxy attacks for the quantum proxy signature scheme are introduced. We demonstrate that every proxy signer can delegate the proxy signing power to a malicious arbitrator, who can sign any message on behalf of all the proxy signers. At the same time, the original signer can also impersonate the proxy signer to generate a quantum proxy signature without being detected. The forgery attacks may also cause some other serious security drawbacks for the quantum proxy signature. Second, the forgery under chosen-signature attack is introduced. We demonstrate that Qin et al.’s quantum multi-proxy signature cannot resist against the signature receiver’s forgery under chosen-signature attack. The proposed proxy attacks and the forgery under chosen-signature attack can be used as the security analysis tools, which are useful for analyzing and improving the security of the quantum proxy signatures. At last, an improved quantum multi-proxy signature scheme was proposed. The improved scheme is secure against the original signer’s proxy attack and the forgery under chosen-signature attack. Its security against the proxy signer’s proxy attack depends on the credibility of the arbitrator.
Similar content being viewed by others
References
Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(5), 1338–1354 (1996)
Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)
Zhang, J., Wu, Q.: An improved nominative proxy signature scheme for mobile communication. IEICE Trans. Inf. Syst. E88-D(7), 1697–1699 (2005)
Zhang, J., Bai, W., Wang, Y.: Non-interactive ID-based proxy re-signature scheme for IoT based on mobile edge computing. IEEE Access 7, 37865–37875 (2019)
Patonico, S., Shabisha, P., Braeken, A., Touhafi, A., Steenhaut, K.: Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud. In: Concurrency and Computation-Practice & Experience. https://doi.org/10.1002/cpe.5657 (2020)
Shor, P.W.: Algorithms for quantum computation: discrete logarithm and factoring. In: Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, pp. 124–134. IEEE Computer Society Press (1994)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)
Huang, Y., Su, Z., Zhang, F., et al.: Quantum algorithm for solving hyper elliptic curve discrete logarithm problem. Quantum Inf. Process. 19(62), 1–17 (2020)
Xu, G.: Novel quantum proxy signature without entanglement. Int. J. Theor. Phys. 54(8), 2605–2612 (2015)
Guo, W., Zhang, J.Z., Li, Y.P., An, W.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55, 3524–3536 (2016)
Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56, 634–642 (2017)
Huawang, Q., Wallace, K.S.T., Raylin, T.: Batch quantum multi-proxy signature. Opt. Quant. Electron. 50(450), 1–8 (2018)
Liu, G., Ma, W.P., Cao, H., Lyu, D.L.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theor. Phys. 58, 1999–2008 (2019)
Guo, X., Zhang, J.Z., Xie, S.C.: An improved proxy blind signature scheme. Int. J. Theor. Phys. 58(2), 354–363 (2019)
Tiliwalidi, K., Zhang, J.Z., Xie, S.C.: A proxy blind signature scheme of quantum information transmission in two-particle State. Int. J. Theor. Phys. 58(6), 2016–2026 (2019)
Qin, H., Tang, W.K.S., Tso, R.: Efficient quantum multi-proxy signature. Quantum Inf. Process. 18(53), 1–9 (2019)
Cai, Q.Y., Li, W.B.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)
Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)
Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Zhang, Y., Zeng, J.: An improved arbitrated quantum scheme with Bell states. Int. J. Theor. Phys. 57, 994–1003 (2018)
Xin, X., He, Q., Wang, Z., et al.: Efficient arbitrated quantum signature scheme without entangled states. Mod. Phys. Lett. A 34(21), 1950166-1-9 (2019)
Xin, X., He, Q., Wang, Z., Yang, Q., et al.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)
Bennett C. H., Brassard G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179. IEEE, India. New York (1984)
Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65(03), 2302 (2002)
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This comment refers to the article available online at https://doi.org/10.1007/s11128-018-2169-2.
Rights and permissions
About this article
Cite this article
Tan, R., Yang, Q. Comments on the “Efficient quantum multi-proxy signature”. Quantum Inf Process 19, 288 (2020). https://doi.org/10.1007/s11128-020-02783-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-020-02783-6