A secure and efficient identity-based quantum signature scheme

被引:2
|
作者
Liu, Bai [1 ]
Zhu, Pengda [1 ]
Guo, Kuikui [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
基金
中国国家自然科学基金;
关键词
CLASSICAL MESSAGES;
D O I
10.1063/5.0212258
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In recent years, identity-based quantum signature protocols have received much attention due to their unique advantages. Based on Bell states, we propose an efficient identity-based quantum signature scheme. In our scheme, the signer's private key is generated from their identity information. The signer uses the private key and secret parameters to generate a signature for the verifier. The verifier, who possesses the identity information of the signer, can authenticate the signature. Our proposed scheme ensures signature non-forgeability and non-repudiation. In addition, the protocol does not require the preparation of long-term quantum memory or the performance of quantum swap tests, making it more efficient than previous schemes. (c) 2024 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution (CC BY) license(https://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [31] An Efficient Post-quantum Identity-Based Signature
    Zhichao, Yang
    Duong, Dung H.
    Susilo, Willy
    Guomin, Yang
    Chao, Li
    Rongmao, Chen
    CHINESE JOURNAL OF ELECTRONICS, 2021, 30 (02) : 238 - 248
  • [32] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Hu Xiong
    YaNan Chen
    GuoBin Zhu
    ZhiGuang Qin
    Science China Information Sciences, 2014, 57 : 1 - 5
  • [33] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    Xiong Hu
    Chen YaNan
    Zhu GuoBin
    Qin ZhiGuang
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (09) : 1 - 5
  • [34] Provable secure identity-based multi-proxy signature scheme
    Sahu, Rajeev Anand
    Padhye, Sahadeo
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2015, 28 (03) : 497 - 512
  • [35] Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios
    Krzywiecki, Lukasz
    Slowik, Marta
    Szala, Michal
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2019, 2019, 11879 : 310 - 324
  • [36] Analysis and improvement of a provable secure fuzzy identity-based signature scheme
    XIONG Hu
    CHEN YaNan
    ZHU GuoBin
    QIN ZhiGuang
    Science China(Information Sciences), 2014, 57 (09) : 156 - 160
  • [37] Identity-based forward secure threshold signature scheme based on mediated rsa
    Yu J.
    Hao R.
    Kong F.
    Cheng X.
    Zhao H.
    Chen Y.
    International Journal of Computers and Applications, 2010, 32 (04) : 469 - 475
  • [38] A secure mobile agent system based on identity-based digital signature scheme
    Lee, Y
    Lee, T
    Chung, I
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 479 - 485
  • [39] New efficient batch verification for an identity-based signature scheme
    Hwang, Jung Yeon
    Choi, Doo Ho
    Cho, Hyunsook
    Song, Boyeon
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (15) : 2524 - 2535
  • [40] An efficient identity-based ring signature scheme and its extension
    Zhang, Jianhong
    Computational Science and Its Applications - ICCSA 2007, Pt 2, Proceedings, 2007, 4706 : 63 - 74