A secure and efficient identity-based quantum signature scheme

被引:2
|
作者
Liu, Bai [1 ]
Zhu, Pengda [1 ]
Guo, Kuikui [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
基金
中国国家自然科学基金;
关键词
CLASSICAL MESSAGES;
D O I
10.1063/5.0212258
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In recent years, identity-based quantum signature protocols have received much attention due to their unique advantages. Based on Bell states, we propose an efficient identity-based quantum signature scheme. In our scheme, the signer's private key is generated from their identity information. The signer uses the private key and secret parameters to generate a signature for the verifier. The verifier, who possesses the identity information of the signer, can authenticate the signature. Our proposed scheme ensures signature non-forgeability and non-repudiation. In addition, the protocol does not require the preparation of long-term quantum memory or the performance of quantum swap tests, making it more efficient than previous schemes. (c) 2024 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution (CC BY) license(https://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [21] An Efficient Identity-Based Signature Scheme for Vehicular Communications
    Zhang, Yaling
    Yang, Liang
    Wang, Shangping
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 326 - 330
  • [22] Efficient Unrestricted Identity-Based Aggregate Signature Scheme
    Yuan, Yumin
    Zhan, Qian
    Huang, Hua
    PLOS ONE, 2014, 9 (10):
  • [23] Secure and efficient identity-based threshold signcryption scheme
    Sun, Hua
    Zheng, Xue-Feng
    Yu, Yi-Ke
    Zhou, Fang
    Kongzhi yu Juece/Control and Decision, 2010, 25 (07): : 1031 - 1034
  • [24] An efficient and full secure identity-based encryption scheme
    Ma, Rong
    Cao, Zhen-Fu
    Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2010, 44 (03): : 389 - 392
  • [25] Forward-secure identity-based signature with efficient revocation
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2017, 94 (07) : 1390 - 1411
  • [26] Efficient pairing-free provably secure identity-based proxy blind signature scheme
    Tan, Zuowen
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 593 - 601
  • [27] Efficient and Secure Identity-based Strong Key-Insulated Signature Scheme without Pairings
    Reddy, P. Vasudeva
    Babu, A. Ramesh
    Gayathri, N. B.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (10) : 1211 - 1218
  • [28] Secure and Efficient Identity-based Batch Verification Signature Scheme for ADS-B System
    Zhou, Jing-xian
    Yan, Jian-hua
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (12): : 6243 - 6259
  • [29] Efficient Pairing-Free Provably Secure Scalable Revocable Identity-Based Signature Scheme
    Wang, Chang-Ji
    Huang, Hui
    Yuan, Yuan
    JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (02): : 503 - 509
  • [30] An Efficient Post-quantum Identity-Based Signature
    YANG Zhichao
    DUNG H.Duong
    WILLY Susilo
    YANG Guomin
    LI Chao
    CHEN Rongmao
    Chinese Journal of Electronics, 2021, 30 (02) : 238 - 248