Security of the arbitrated quantum signature protocols revisited

被引:19
作者
Zhang Kejia [1 ]
Li Dan [1 ,2 ]
Su Qi [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Natl Univ Ireland, Sch Math, De Brun Ctr Computat Algebra, Galway, Ireland
基金
北京市自然科学基金;
关键词
arbitrated quantum signature; forgery attack; security criterion; KEY DISTRIBUTION; QSDC PROTOCOL; SECRET; ATTACK; CRYPTOGRAPHY; ENTANGLEMENT; MESSAGES; SCHEME;
D O I
10.1088/0031-8949/89/01/015102
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, much attention has been paid to the study of arbitrated quantum signature (AQS). Among these studies, the cryptanalysis of some AQS protocols and a series of improved ideas have been proposed. Compared with the previous analysis, we present a security criterion, which can judge whether an AQS protocol is able to prevent the receiver (i.e. one participant in the signature protocol) from forging a legal signature. According to our results, it can be seen that most AQS protocols which are based on the Zeng and Keitel (ZK) model are susceptible to a forgery attack. Furthermore, we present an improved idea of the ZK protocol. Finally, some supplement discussions and several interesting topics are provided.
引用
收藏
页数:8
相关论文
共 43 条
[1]  
[Anonymous], ARXIV QUANTPH
[2]  
Barnum H, 2002, ANN IEEE SYMP FOUND, P449, DOI 10.1109/SFCS.2002.1181969
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[5]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[6]   Optimal encryption of quantum bits [J].
Boykin, PO ;
Roychowdhury, V .
PHYSICAL REVIEW A, 2003, 67 (04) :6
[7]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[8]   Security problem on arbitrated quantum signature schemes [J].
Choi, Jeong Woon ;
Chang, Ku-Young ;
Hong, Dowon .
PHYSICAL REVIEW A, 2011, 84 (06)
[9]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[10]   Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J].
Deng, FG ;
Long, GL ;
Liu, XS .
PHYSICAL REVIEW A, 2003, 68 (04) :6