Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party

被引:5
|
作者
Zhang, Ling [1 ]
Zhang, Jia-Hao [1 ]
Xin, Xiang-Jun [1 ]
Li, Chao-Yang [1 ]
Huang, Min [1 ]
机构
[1] Zhengzhou Univ Light Ind, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Signature scheme; Quantum signature; Designated verifier; Security;
D O I
10.1007/s10773-023-05428-3
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding using DVS attributes to protect the secret of participants. Most traditional DVS schemes are vulnerable to quantum computer attacks. Then, an identity-based semi-trusted third-party quantum DVS (STQDVS) scheme is proposed, which is safe for quantum means of attack. In the new STQDVS scheme, the third participant prepares entangled Bell states and allocates them to the signer and the designated verifier (DV). The signer uses the identity information as her public key and the measurement results of corresponding quantum sequences as her private key to generate the signature. The DV applies the identity information as his public key and the measurement results of corresponding quantum sequences as her private key to verify the signature. Non-transferability and hidden origin are guaranteed by the fact that the DV can generate the same signature as the signatory by means of a simulated signature step. Security analysis has shown that attacks such as forgery, inter-resending, and impersonation are ineffective for the proposed scheme and that even third-party cannot forge signatures. On the other hand, the whole process of the scheme does not require any quantum key distribution protocols, quantum one-way functions, and quantum state exchange tests, which makes the STQDVS scheme relatively simple and more efficient than similar schemes.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] An Obfuscatable Designated Verifier Signature Scheme
    Shi, Yang
    Fan, Hongfei
    Liu, Qin
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2017, 5 (02) : 271 - 285
  • [22] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [23] A multi-party non-repudiation protocol with semi-trusted third party
    Wang, CF
    Ge, JH
    Du, XJ
    Qu, J
    Zhao, TS
    Yang, SY
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 188 - 191
  • [24] On the security of group signature scheme and designated verifier signature scheme
    Zhang, Jianhong
    Geng, Qin
    PROCEEDINGS OF THE 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2008, : 351 - 358
  • [25] A scheme on converting quantum deniable authentication into universal quantum designated verifier signature
    Shi, Wei-Min
    Shuo-Wang
    Wang, Yan-Mei
    Zhou, Yi-Hua
    Yang, Yu-Guang
    OPTIK, 2019, 190 : 10 - 20
  • [26] A non-repudiation fair exchange protocol with semi-trusted third party
    2001, Huazhong University of Science and Technology (29):
  • [27] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Zheng, D
    Chen, KF
    You, JY
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2002, 17 (06) : 749 - 756
  • [28] Multiparty authentication services and key agreement protocols with semi-trusted third party
    Dong Zheng
    Kefei Chen
    Jinyuan You
    Journal of Computer Science and Technology, 2002, 17 : 749 - 756
  • [29] Strong designated verifier ring signature scheme
    Lee, Ji-Seon
    Chang, Jik Hyun
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 543 - 547
  • [30] An Efficient Certificateless Designated Verifier Signature Scheme
    He, Debiao
    Chen, Jianhua
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2013, 10 (04) : 389 - 396