Identity-based quantum signature based on Bell states

被引:5
作者
Xin, Xiangjun [1 ]
Wang, Zhuo [1 ]
Yang, Qinglan [2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
来源
OPTIK | 2020年 / 200卷
关键词
Quantum signature; Identity-based signature; Bell state; Quantum swap test; SCHEME; SECURITY;
D O I
10.1016/j.ijleo.2019.163388
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Based on the Bell states, an identity-based quantum signature scheme is proposed. In our scheme, the signer's private key is generated by a trusted third party called private key generator(PKG), while the signer's public key is his/her identity(such as his/her name or email address). The message to be signed is encoded into a Bell state sequence. To generate a quantum signature, the signer signs the Bell state sequence with his/her private key. The quantum signature can be verified by anyone with the signer's identity. Our quantum signature scheme has the advantages of the classical identity-based signature scheme. It need not use long-term quantum memory. On the other hand, in our scheme, during the signature verification phase, the verifier need not perform any quantum swap test. What is more, in our scheme, PKG can arbitrate the disputation of losing quantum signature, which cannot be arbitrated in most of the quantum signature schemes. Our scheme also has the security properties of non-repudation, unforgeability, etc. Our signature is more secure, efficient and practicable than the similar schemes.
引用
收藏
页数:8
相关论文
共 50 条
[21]   A Survey on Identity-Based Blind Signature [J].
Koscina, Mirko ;
Lafourcade, Pascal ;
Marcadet, Gael ;
Olivier-Anclin, Charles ;
Robert, Leo .
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2022, 2023, 13877 :19-37
[22]   On the security of an identity-based signature scheme [J].
Huang, X.-Y. (xyhuang81@gmail.com), 1600, Science Press (37) :1025-1029
[23]   Trusted Routing Based on Identity-Based Threshold Signature for Opportunistic Networks [J].
Chen Xi ;
Tian Youliang ;
Li Xinghua ;
Ma Jianfeng .
CHINA COMMUNICATIONS, 2011, 8 (04) :132-140
[24]   Identity-based signature scheme based on quintic residues [J].
Dong, Xue-Dong ;
Gao, Yuan .
PROCEEDINGS OF THE 2ND ANNUAL INTERNATIONAL CONFERENCE ON ELECTRONICS, ELECTRICAL ENGINEERING AND INFORMATION SCIENCE (EEEIS 2016), 2016, 117 :836-841
[25]   Quantum secret sharing with identity authentication based on Bell states [J].
Abulkasim, Hussein ;
Hamad, Safwat ;
Khalifa, Amal ;
El Bahnasy, Khalid .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2017, 15 (04)
[26]   Novel efficient identity-based signature on lattices [J].
Chen, Jiang-shan ;
Hu, Yu-pu ;
Liang, Hong-mei ;
Gao, Wen .
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2021, 22 (02) :244-250
[27]   RKA Security for Identity-Based Signature Scheme [J].
Chang, Jinyong ;
Wang, Huiqun ;
Wang, Fei ;
Zhang, Anling ;
Ji, Yanyan .
IEEE ACCESS, 2020, 8 :17833-17841
[28]   Comments on an identity-based signature scheme for VANETs [J].
Song, Yaqing ;
Xu, Chunxiang ;
Zhang, Yuan ;
Li, Fagen .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 112
[29]   Efficient Identity-Based Signature from Lattices [J].
Tian, Miaomiao ;
Huang, Liusheng .
ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, 2014, 428 :321-329
[30]   Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model [J].
Foo, Ernest ;
Li, Qinyi .
INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 :381-402