Skip to main content
Log in

Comments on the “Efficient quantum multi-proxy signature”

  • Comment
  • Published:
Quantum Information Processing Aims and scope Submit manuscript

The Original Article was published on 09 January 2019

Abstract

Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency. Unfortunately, it is not secure against proxy attacks and forgery attack. In this paper, first, the proxy attacks for the quantum proxy signature scheme are introduced. We demonstrate that every proxy signer can delegate the proxy signing power to a malicious arbitrator, who can sign any message on behalf of all the proxy signers. At the same time, the original signer can also impersonate the proxy signer to generate a quantum proxy signature without being detected. The forgery attacks may also cause some other serious security drawbacks for the quantum proxy signature. Second, the forgery under chosen-signature attack is introduced. We demonstrate that Qin et al.’s quantum multi-proxy signature cannot resist against the signature receiver’s forgery under chosen-signature attack. The proposed proxy attacks and the forgery under chosen-signature attack can be used as the security analysis tools, which are useful for analyzing and improving the security of the quantum proxy signatures. At last, an improved quantum multi-proxy signature scheme was proposed. The improved scheme is secure against the original signer’s proxy attack and the forgery under chosen-signature attack. Its security against the proxy signer’s proxy attack depends on the credibility of the arbitrator.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(5), 1338–1354 (1996)

    Google Scholar 

  2. Li, X., Chen, K., Sun, L.: Certificateless signature and proxy signature schemes from bilinear pairings. Lith. Math. J. 45(1), 76–83 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  3. Zhang, J., Wu, Q.: An improved nominative proxy signature scheme for mobile communication. IEICE Trans. Inf. Syst. E88-D(7), 1697–1699 (2005)

    Article  ADS  Google Scholar 

  4. Zhang, J., Bai, W., Wang, Y.: Non-interactive ID-based proxy re-signature scheme for IoT based on mobile edge computing. IEEE Access 7, 37865–37875 (2019)

    Article  Google Scholar 

  5. Patonico, S., Shabisha, P., Braeken, A., Touhafi, A., Steenhaut, K.: Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud. In: Concurrency and Computation-Practice & Experience. https://doi.org/10.1002/cpe.5657 (2020)

  6. Shor, P.W.: Algorithms for quantum computation: discrete logarithm and factoring. In: Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, pp. 124–134. IEEE Computer Society Press (1994)

  7. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  8. Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)

    Article  ADS  Google Scholar 

  9. Huang, Y., Su, Z., Zhang, F., et al.: Quantum algorithm for solving hyper elliptic curve discrete logarithm problem. Quantum Inf. Process. 19(62), 1–17 (2020)

    ADS  MathSciNet  Google Scholar 

  10. Xu, G.: Novel quantum proxy signature without entanglement. Int. J. Theor. Phys. 54(8), 2605–2612 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  11. Guo, W., Zhang, J.Z., Li, Y.P., An, W.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55, 3524–3536 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  12. Yan, L.L., Chang, Y., Zhang, S.B., Han, G.H., Sheng, Z.W.: A quantum multi-proxy weak blind signature scheme based on entanglement swapping. Int. J. Theor. Phys. 56, 634–642 (2017)

    Article  MATH  Google Scholar 

  13. Huawang, Q., Wallace, K.S.T., Raylin, T.: Batch quantum multi-proxy signature. Opt. Quant. Electron. 50(450), 1–8 (2018)

    MATH  Google Scholar 

  14. Liu, G., Ma, W.P., Cao, H., Lyu, D.L.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theor. Phys. 58, 1999–2008 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  15. Guo, X., Zhang, J.Z., Xie, S.C.: An improved proxy blind signature scheme. Int. J. Theor. Phys. 58(2), 354–363 (2019)

    Article  MATH  Google Scholar 

  16. Tiliwalidi, K., Zhang, J.Z., Xie, S.C.: A proxy blind signature scheme of quantum information transmission in two-particle State. Int. J. Theor. Phys. 58(6), 2016–2026 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  17. Qin, H., Tang, W.K.S., Tso, R.: Efficient quantum multi-proxy signature. Quantum Inf. Process. 18(53), 1–9 (2019)

    MathSciNet  MATH  Google Scholar 

  18. Cai, Q.Y., Li, W.B.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)

    Article  ADS  Google Scholar 

  19. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

  20. Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  ADS  Google Scholar 

  21. Zhang, Y., Zeng, J.: An improved arbitrated quantum scheme with Bell states. Int. J. Theor. Phys. 57, 994–1003 (2018)

    Article  MathSciNet  MATH  Google Scholar 

  22. Xin, X., He, Q., Wang, Z., et al.: Efficient arbitrated quantum signature scheme without entangled states. Mod. Phys. Lett. A 34(21), 1950166-1-9 (2019)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  23. Xin, X., He, Q., Wang, Z., Yang, Q., et al.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)

    Article  ADS  Google Scholar 

  24. Bennett C. H., Brassard G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179. IEEE, India. New York (1984)

  25. Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65(03), 2302 (2002)

    Article  ADS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qinglan Yang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This comment refers to the article available online at https://doi.org/10.1007/s11128-018-2169-2.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tan, R., Yang, Q. Comments on the “Efficient quantum multi-proxy signature”. Quantum Inf Process 19, 288 (2020). https://doi.org/10.1007/s11128-020-02783-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-020-02783-6

Keywords

Navigation