Cryptanalysis of the arbitrated quantum signature protocols

被引:166
作者
Gao, Fei [1 ,2 ]
Qin, Su-Juan [1 ]
Guo, Fen-Zhuo [1 ]
Wen, Qiao-Yan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
基金
北京市自然科学基金;
关键词
ATTACK;
D O I
10.1103/PhysRevA.84.022344
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver, Bob, can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender, Alice, can successfully disavow any of her signatures by simple attack. The attack strategies are described in detail and some discussions about the potential improvements of the protocols are given. Finally we also present several interesting topics on AQS protocols that can be studied in future.
引用
收藏
页数:6
相关论文
共 43 条
[1]  
Barnum H, 2002, ANN IEEE SYMP FOUND, P449, DOI 10.1109/SFCS.2002.1181969
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Deterministic secure direct communication using entanglement -: art. no. 187902 [J].
Boström, K ;
Felbinger, T .
PHYSICAL REVIEW LETTERS, 2002, 89 (18) :187902/1-187902/4
[5]   Optimal encryption of quantum bits [J].
Boykin, PO ;
Roychowdhury, V .
PHYSICAL REVIEW A, 2003, 67 (04) :6
[6]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[7]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[8]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[9]   Qubit authentication -: art. no. 022301 [J].
Curty, M ;
Santos, DJ ;
Pérez, E ;
García-Fernández, P .
PHYSICAL REVIEW A, 2002, 66 (02) :1-7
[10]   Comment on "arbitrated quantum-signature scheme" [J].
Curty, Marcos ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2008, 77 (04)