Continuous variable quantum signature algorithm

被引:46
作者
Zeng, Guihua [1 ]
Lee, Moonho
Guo, Ying
He, Guangqiang
机构
[1] Shanghai Jiao Tong Univ, Lab Coding & Commun Secur, Shanghai 200030, Peoples R China
[2] Chonbuk Natl Univ, Inst Informat & Commun, Dept Informat & Commun Engn, Chonju 561756, South Korea
基金
中国国家自然科学基金;
关键词
cryptography; signature algorithm; entanglement; quantum information;
D O I
10.1142/S0219749907003031
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a one-way function. By employing the signature key, a message state is encoded into a 2k-particle entangled state and a two-particle entangled state is prepared. The resulting states are exploited as a signature of the message state. The signature can be decoded under the verification key when it needs to be verified. Subsequently, a decoded message state and a two-particle entangled state are obtained. To compare the decoded states and the original states, a quantum circuit for comparing these states is exploited. Making use of measurement results of the quantum circuit one can judge the authenticity of the received signature. According to the security requirement of the signature scheme, the suggested algorithm has been proven to be theoretically secure by using the Shannon information theory.
引用
收藏
页码:553 / 573
页数:21
相关论文
共 29 条
[1]  
[Anonymous], P 35 ANN S FDN COMP
[2]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[3]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[4]  
Bennett Charles H., 1984, LNCS, V196, P475, DOI DOI 10.1007/3-540-39568-7_39
[5]   Quantum information with continuous variables [J].
Braunstein, SL ;
van Loock, P .
REVIEWS OF MODERN PHYSICS, 2005, 77 (02) :513-577
[6]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[7]   QUANTUM COMPUTERS, FACTORING, AND DECOHERENCE [J].
CHUANG, IL ;
LAFLAMME, R ;
SHOR, PW ;
ZUREK, WH .
SCIENCE, 1995, 270 (5242) :1633-1635
[8]   QUANTUM COMPUTATIONS WITH COLD TRAPPED IONS [J].
CIRAC, JI ;
ZOLLER, P .
PHYSICAL REVIEW LETTERS, 1995, 74 (20) :4091-4094
[9]   How to share a quantum secret [J].
Cleve, R ;
Gottesman, D ;
Lo, HK .
PHYSICAL REVIEW LETTERS, 1999, 83 (03) :648-651
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663