Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes

被引:7
作者
Chen, Feng-Lin [1 ]
Zhang, Li-Hua [2 ]
Zhang, Hai [1 ]
机构
[1] Anqing Normal Univ, Sch Math & Computat Sci, Anqing 246011, Peoples R China
[2] Anqing Normal Univ, Sch Phys & Elect Engn, Anqing 246011, Peoples R China
关键词
Arbitrated quantum signature; Quantum one-time pad encryption; Controlled SWAP; Cryptanalysis; Diffusion; CLASSICAL MESSAGES;
D O I
10.1007/s11128-019-2265-y
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The quantum one-time pad (QOTP) usually serves as the quantum encryption to encrypt quantum messages in arbitrated quantum signature (AQS) schemes. The original QOTP is a qubit-by-qubit encryption algorithm with message and encrypted signature always appearing in pair in AQS, which will lead to the vulnerability of the AQS scheme. By comparing the two quantum state pairs in AQS with the C-SWAP attack, it is possible for the attacker to obtain the signer's key, which leads to the security weakness of AQS. Accordingly, we propose a new attack on AQS scheme for the first time. In order to deal with the attack on AQS scheme, QOTP must be replaced by an improved quantum encryption scheme. Based on QOTP with confusion, we proposed an improved quantum encryption scheme which can resist the attack in AQS scheme. Security analysis shows that the improved quantum encryption scheme works efficiently and securely.
引用
收藏
页数:18
相关论文
共 44 条
[11]   Quantum Digital Signatures without Quantum Memory [J].
Dunjko, Vedran ;
Wallden, Petros ;
Andersson, Erika .
PHYSICAL REVIEW LETTERS, 2014, 112 (04)
[12]   Cryptanalysis of the arbitrated quantum signature protocols [J].
Gao, Fei ;
Qin, Su-Juan ;
Guo, Fen-Zhuo ;
Wen, Qiao-Yan .
PHYSICAL REVIEW A, 2011, 84 (02)
[13]   Quantum cryptography [J].
Gisin, N ;
Ribordy, GG ;
Tittel, W ;
Zbinden, H .
REVIEWS OF MODERN PHYSICS, 2002, 74 (01) :145-195
[14]  
Gottesman D., 2001, Quantum digital signatures
[15]  
Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866
[16]  
Hallgren S., 2005, Proceedings of the 37th ACM Symposium on Theory of Computing (STOC), P468, DOI DOI 10.1145/1060590.1060660
[17]   Comment on "Security analysis and improvements of arbitrated quantum signature schemes" [J].
Hwang, Tzonelih ;
Luo, Yi-Ping ;
Chong, Song-Kong .
PHYSICAL REVIEW A, 2012, 85 (05)
[18]  
Lamport L., 1979, CSL98 SRI INT
[19]   Arbitrated quantum signature scheme with message recovery [J].
Lee, H ;
Hong, CH ;
Kim, H ;
Lim, J ;
Yang, HJ .
PHYSICS LETTERS A, 2004, 321 (5-6) :295-300
[20]   An arbitrated quantum signature protocol based on the chained CNOT operations encryption [J].
Li, Feng-Guang ;
Shi, Jian-Hong .
QUANTUM INFORMATION PROCESSING, 2015, 14 (06) :2171-2181