Identity-based quantum signature based on Bell states

被引:5
作者
Xin, Xiangjun [1 ]
Wang, Zhuo [1 ]
Yang, Qinglan [2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
来源
OPTIK | 2020年 / 200卷
关键词
Quantum signature; Identity-based signature; Bell state; Quantum swap test; SCHEME; SECURITY;
D O I
10.1016/j.ijleo.2019.163388
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Based on the Bell states, an identity-based quantum signature scheme is proposed. In our scheme, the signer's private key is generated by a trusted third party called private key generator(PKG), while the signer's public key is his/her identity(such as his/her name or email address). The message to be signed is encoded into a Bell state sequence. To generate a quantum signature, the signer signs the Bell state sequence with his/her private key. The quantum signature can be verified by anyone with the signer's identity. Our quantum signature scheme has the advantages of the classical identity-based signature scheme. It need not use long-term quantum memory. On the other hand, in our scheme, during the signature verification phase, the verifier need not perform any quantum swap test. What is more, in our scheme, PKG can arbitrate the disputation of losing quantum signature, which cannot be arbitrated in most of the quantum signature schemes. Our scheme also has the security properties of non-repudation, unforgeability, etc. Our signature is more secure, efficient and practicable than the similar schemes.
引用
收藏
页数:8
相关论文
共 50 条
[41]   Identity-Based Multi-party Revocable Quantum-Resistant Signature with CSP [J].
Zhang, Yilei ;
Wu, Faguo ;
Wang, Chenxu .
5TH INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM 2019), 2019, :133-141
[42]   Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones [J].
Shin, Young Ah ;
Jeong, Ik Rae ;
Byun, Jin Wook .
IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) :4191-4205
[43]   An efficient identity-based signature scheme with provable security [J].
Yi, Peng ;
Li, Jiguo ;
Liu, Chengdong ;
Han, Jinguang ;
Wang, Huaqun ;
Zhang, Yichen ;
Chen, Yu .
INFORMATION SCIENCES, 2021, 576 :790-799
[44]   Fuzzy Biometric identity-based signature in the standard model [J].
Zhang Leyou ;
Wu Qing ;
Hu Yupu .
FRONTIERS OF MANUFACTURING AND DESIGN SCIENCE, PTS 1-4, 2011, 44-47 :3350-+
[45]   An efficient identity-based signature protocol over lattices for the smart grid [J].
Zhu, Longzhu ;
Jiang, Fan ;
Luo, Min ;
Li, Quanrun .
HIGH-CONFIDENCE COMPUTING, 2023, 3 (04)
[46]   Intrusion-resilient identity-based signature: Security definition and construction [J].
Yu, Jia ;
Kong, Fanyu ;
Cheng, Xiangguo ;
Hao, Rong ;
Fan, Jianxi .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (02) :382-391
[47]   IDENTITY-BASED KEY-INSULATED PROXY SIGNATURE [J].
Wan Zhongmei Lai Xuejia Weng Jian Liu Shengli Hong Xuan (Department of Computer Science and Engineering .
Journal of Electronics(China), 2009, 26 (06) :853-858
[48]   Identity-Based Linkable Ring Signature on NTRU Lattice [J].
Tang, Yongli ;
Xia, Feifei ;
Ye, Qing ;
Wang, Mengyao ;
Mu, Ruijie ;
Zhang, Xiaohang .
SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
[49]   Practical Identity-Based Signature for Wireless Sensor Networks [J].
Li, Fagen ;
Zhong, Di ;
Takagi, Tsuyoshi .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2012, 1 (06) :637-640
[50]   Efficient fair exchange from identity-based signature [J].
Yum, Dae Hyun ;
Lee, Pil Joong .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) :119-126