Abstract
This comment explains that the quantum signature scheme proposed by Ming-Xing Luo et al. (in Int. J. Theor. Phys. 51:2134, 2012) cannot satisfy the signature requirements. The comment presents methods of possible attacks by forgers, while also demonstrating that it is difficult to proceed by the normal protocol because of some errors in the formula of the scheme.
Similar content being viewed by others
References
Lou, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Int. J. Theor. Phys. 51, 2135 (2012)
Menezes, A.J., Von Oorschot, P.C., Vantone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
Forouzan, B.A.: Cryptography and Network Security. McGraw Hill International Edition, New York (2008)
Zeng, G.H., Keitel, C.H.: Phys. Rev. A 65, 042312 (2002)
Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.j.: Phys. Lett. A 321, 295 (2004)
Li, Q., Chan, W.H., Long, D.Y.: Phys. Rev. A 79, 054307 (2009)
Zou, X., Qiu, D.: Phys. Rev. A 84, 042325 (2010)
Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Phys. Rev. A 84, 022344 (2011)
Choi, J.W., Chang, K.Y., Hong, D.: Phys. Rev. A 84, 062330 (2011)
Zou, X., Qiu, D., Yu, F., Mateus, P.: Int. J. Theor. Phys. 51, 2135 (2013). doi:10.1007/s10773-013-1846-2
Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Phys. Rev. Lett. 87, 167902 (2001)
Leung, D.W.: Quantum Inf. Comput. 2(1), 14–34 (2002)
Boykin, P.O., Roychowdhury, V.: Phys. Rev. A 67, 042317 (2003)
Acknowledgements
This research was supported by the research foundation of Korea University.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kang, MS., Hong, CH., Heo, J. et al. Comment on “Quantum Signature Scheme with Weak Arbitrator”. Int J Theor Phys 53, 1862–1866 (2014). https://doi.org/10.1007/s10773-013-1988-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10773-013-1988-2