Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes

被引:7
作者
Chen, Feng-Lin [1 ]
Zhang, Li-Hua [2 ]
Zhang, Hai [1 ]
机构
[1] Anqing Normal Univ, Sch Math & Computat Sci, Anqing 246011, Peoples R China
[2] Anqing Normal Univ, Sch Phys & Elect Engn, Anqing 246011, Peoples R China
关键词
Arbitrated quantum signature; Quantum one-time pad encryption; Controlled SWAP; Cryptanalysis; Diffusion; CLASSICAL MESSAGES;
D O I
10.1007/s11128-019-2265-y
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The quantum one-time pad (QOTP) usually serves as the quantum encryption to encrypt quantum messages in arbitrated quantum signature (AQS) schemes. The original QOTP is a qubit-by-qubit encryption algorithm with message and encrypted signature always appearing in pair in AQS, which will lead to the vulnerability of the AQS scheme. By comparing the two quantum state pairs in AQS with the C-SWAP attack, it is possible for the attacker to obtain the signer's key, which leads to the security weakness of AQS. Accordingly, we propose a new attack on AQS scheme for the first time. In order to deal with the attack on AQS scheme, QOTP must be replaced by an improved quantum encryption scheme. Based on QOTP with confusion, we proposed an improved quantum encryption scheme which can resist the attack in AQS scheme. Security analysis shows that the improved quantum encryption scheme works efficiently and securely.
引用
收藏
页数:18
相关论文
共 44 条
[1]   Secure quantum signatures using insecure quantum channels [J].
Amiri, Ryan ;
Wallden, Petros ;
Kent, Adrian ;
Andersson, Erika .
PHYSICAL REVIEW A, 2016, 93 (03)
[2]  
Bennett C. H., 1984, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, P175, DOI [10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2014.05.025]
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]  
Boykin P.O., 2003, PHYS REV A, V67, P645
[5]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[6]   Eavesdropping on the two-way quantum communication protocols with invisible photons [J].
Cai, QY .
PHYSICS LETTERS A, 2006, 351 (1-2) :23-25
[7]   Security problem on arbitrated quantum signature schemes [J].
Choi, Jeong Woon ;
Chang, Ku-Young ;
Hong, Dowon .
PHYSICAL REVIEW A, 2011, 84 (06)
[8]   Realization of Quantum Digital Signatures without the Requirement of Quantum Memory [J].
Collins, Robert J. ;
Donaldson, Ross J. ;
Dunjko, Vedran ;
Wallden, Petros ;
Clarke, Patrick J. ;
Andersson, Erika ;
Jeffers, John ;
Buller, Gerald S. .
PHYSICAL REVIEW LETTERS, 2014, 113 (04)
[9]  
Crandall R, 2005, PRIME NUMBERS COMPUT
[10]  
DENG FG, 2005, ARXIVQUANTPH0508168