A proxy blind signature scheme based on quantum entanglement

被引:6
作者
Tian, Yuan [1 ,2 ]
Chen, Hong [1 ,2 ]
Yan, Gao [3 ]
Tian, Jingfeng [4 ]
Wen, Xiaojun [5 ]
机构
[1] Renmin Univ China, Minist Educ, Key Lab Data Engn & Knowledge Engn, Beijing 100872, Peoples R China
[2] Renmin Univ China, Sch Informat, Beijing 100872, Peoples R China
[3] Univ Sci & Technol China, Hefei 230022, Peoples R China
[4] Sch Geni, Hulunbeier 162772, Peoples R China
[5] Shenzhen Polytech, Sch Elect & Informat Engn, Shenzhen 518055, Peoples R China
关键词
Proxy blind signature; Quantum encryption algorithm; Quantum entanglement; Quantum cryptography; SECURITY;
D O I
10.1007/s11082-013-9753-6
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Using the correlation states of the GHZ triplet, a proxy blind signature scheme is presented. Existing classical proxy signatures cannot guarantee the security with the emergency of quantum computing technology, current quantum signature schemes could only deliver unconditional security, our quantum proxy blind signature scheme has the characteristics of proxy signature, non-counterfeit, non-disavowal and blindness by adopting quantum key preparation, quantum encryption algorithm and quantum entanglement, Our quantum proxy blind signature scheme has a foreseeable application to the E-business, E-governments, and etc.
引用
收藏
页码:1297 / 1305
页数:9
相关论文
共 22 条
[1]  
[Anonymous], 2003, CRYPTOGRAPHY NETWORK
[2]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[3]  
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[4]   Efficient blind signature scheme based on quadratic residues [J].
Fan, CI ;
Lei, CL .
ELECTRONICS LETTERS, 1996, 32 (09) :811-813
[5]  
Gottesman D., 2002, ARXIVORGABSQUANTPH01
[6]   CRYPTANALYSIS OF THE BLIND SIGNATURES BASED ON THE DISCRETE LOGARITHM PROBLEM [J].
HARN, L .
ELECTRONICS LETTERS, 1995, 31 (14) :1136-1136
[7]   Arbitrated quantum signature scheme with message recovery [J].
Lee, H ;
Hong, CH ;
Kim, H ;
Lim, J ;
Yang, HJ .
PHYSICS LETTERS A, 2004, 321 (5-6) :295-300
[8]  
Mambo M, 1997, IEICE T FUND ELECTR, VE80A, P54
[9]   Unconditional security in quantum cryptography [J].
Mayers, D .
JOURNAL OF THE ACM, 2001, 48 (03) :351-406
[10]   A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform [J].
Shi, Jinjing ;
Shi, Ronghua ;
Tang, Ying ;
Lee, Moon Ho .
QUANTUM INFORMATION PROCESSING, 2011, 10 (05) :653-670