A secure and efficient identity-based quantum signature scheme

被引:2
|
作者
Liu, Bai [1 ]
Zhu, Pengda [1 ]
Guo, Kuikui [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
基金
中国国家自然科学基金;
关键词
CLASSICAL MESSAGES;
D O I
10.1063/5.0212258
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In recent years, identity-based quantum signature protocols have received much attention due to their unique advantages. Based on Bell states, we propose an efficient identity-based quantum signature scheme. In our scheme, the signer's private key is generated from their identity information. The signer uses the private key and secret parameters to generate a signature for the verifier. The verifier, who possesses the identity information of the signer, can authenticate the signature. Our proposed scheme ensures signature non-forgeability and non-repudiation. In addition, the protocol does not require the preparation of long-term quantum memory or the performance of quantum swap tests, making it more efficient than previous schemes. (c) 2024 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution (CC BY) license(https://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [41] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [42] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    PLOS ONE, 2014, 9 (09):
  • [43] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [44] Efficient Signature Scheme with Batch Verifications in Identity-Based Framework
    Gopal, P. V. S. S. N.
    Reddy, P. Vasudeva
    Gowri, T.
    ETRI JOURNAL, 2016, 38 (02) : 397 - 404
  • [45] Comment on "An efficient identity-based signature scheme with provable security"
    Tan, Syh-Yuan
    Heng, Swee-Huay
    INFORMATION SCIENCES, 2024, 659
  • [46] Efficient identity-based signature scheme with partial message recovery
    Li, Yong
    Chen, Huiyan
    SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 883 - +
  • [47] Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
    Zhang, Yang
    Tang, Yu
    Li, Chaoyang
    Zhang, Hua
    Ahmad, Haseeb
    SENSORS, 2024, 24 (13)
  • [48] Efficient Generic Construction of Forward-Secure Identity-Based Signature
    Al Ebri, Noura
    Baek, Joonsang
    Shoufan, Abdulhadi
    Quang Hieu Vu
    2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 55 - 64
  • [49] Efficient forward secure identity-based shorter signature from lattice
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1963 - 1971
  • [50] Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie–Hellman Problem
    Xiaoming Hu
    Xiaojun Zhang
    Jian Wang
    Huajie Xu
    Wenan Tan
    Yinchun Yang
    Arabian Journal for Science and Engineering, 2017, 42 : 639 - 649