Identity-based quantum signature based on Bell states

被引:6
作者
Xin, Xiangjun [1 ]
Wang, Zhuo [1 ]
Yang, Qinglan [2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
来源
OPTIK | 2020年 / 200卷
关键词
Quantum signature; Identity-based signature; Bell state; Quantum swap test; SCHEME; SECURITY;
D O I
10.1016/j.ijleo.2019.163388
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Based on the Bell states, an identity-based quantum signature scheme is proposed. In our scheme, the signer's private key is generated by a trusted third party called private key generator(PKG), while the signer's public key is his/her identity(such as his/her name or email address). The message to be signed is encoded into a Bell state sequence. To generate a quantum signature, the signer signs the Bell state sequence with his/her private key. The quantum signature can be verified by anyone with the signer's identity. Our quantum signature scheme has the advantages of the classical identity-based signature scheme. It need not use long-term quantum memory. On the other hand, in our scheme, during the signature verification phase, the verifier need not perform any quantum swap test. What is more, in our scheme, PKG can arbitrate the disputation of losing quantum signature, which cannot be arbitrated in most of the quantum signature schemes. Our scheme also has the security properties of non-repudation, unforgeability, etc. Our signature is more secure, efficient and practicable than the similar schemes.
引用
收藏
页数:8
相关论文
共 50 条
[31]   Efficient Signature Scheme with Batch Verifications in Identity-Based Framework [J].
Gopal, P. V. S. S. N. ;
Reddy, P. Vasudeva ;
Gowri, T. .
ETRI JOURNAL, 2016, 38 (02) :397-404
[32]   A Schnorr-Like Lightweight Identity-Based Signature Scheme [J].
Galindo, David ;
Garcia, Flavio D. .
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 :135-+
[33]   Compact Identity-Based Signature and Puncturable Signature from SQISign [J].
Shaw, Surbhi ;
Dutta, Ratna .
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2023, PT I, 2024, 14561 :282-305
[34]   Identity-Based Threshold Proxy Signature from Bilinear Pairings [J].
Liu, Jenshiuh ;
Huang, Shaonong .
INFORMATICA, 2010, 21 (01) :41-56
[35]   An Improved Identity-Based Multivariate Signature Scheme Based on Rainbow [J].
Le Van Luyen .
CRYPTOGRAPHY, 2019, 3 (01) :1-11
[36]   Identity-based ring signature scheme based on quadratic residues [J].
Xiong, Hu ;
Qin, Zhiguang ;
Li, Fagen .
High Technology Letters, 2009, 15 (01) :94-100
[37]   Identity-based ring signature scheme based on quadratic residues [J].
熊虎 .
HighTechnologyLetters, 2009, 15 (01) :94-100
[38]   On the security of two identity-based signature schemes based on pairings [J].
Qin, Zhen ;
Yuan, Chen ;
Wang, Yilei ;
Xiong, Hu .
INFORMATION PROCESSING LETTERS, 2016, 116 (06) :416-418
[39]   A cloud-based mobile payment system using identity-based signature providing key revocation [J].
Shamsabadi, Fatemeh Alidadi ;
Chehelcheshmeh, Shaghayegh Bakhtiari .
JOURNAL OF SUPERCOMPUTING, 2022, 78 (02) :2503-2527
[40]   Identity-based proof of retrievability meets with identity-based network coding [J].
Chen, Yixin ;
Chang, Jinyong .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05) :3067-3083