Blind Quantum Signature with Blind Quantum Computation

被引:8
作者
Li, Wei [1 ]
Shi, Ronghua [1 ]
Guo, Ying [1 ,2 ]
机构
[1] Cent South Univ, Sch Informat Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Hunan Normal Univ, Sch Phys Sci & Informat Engn, Changsha 410005, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Blind quantum computation; Entanglement states; Quantum signature; Blind signature; SCHEME;
D O I
10.1007/s10773-016-3252-z
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client's privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.
引用
收藏
页码:1108 / 1115
页数:8
相关论文
共 22 条
  • [1] [Anonymous], CRYPTOGRAPHY NETWORK
  • [2] Blind quantum computation
    Arrighi, Pablo
    Salvail, Louis
    [J]. INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2006, 4 (05) : 883 - 898
  • [3] Demonstration of Blind Quantum Computing
    Barz, Stefanie
    Kashefi, Elham
    Broadbent, Anne
    Fitzsimons, Joseph F.
    Zeilinger, Anton
    Walther, Philip
    [J]. SCIENCE, 2012, 335 (6066) : 303 - 308
  • [4] Universal Blind Quantum Computation
    Broadbent, Anne
    Fitzsimons, Joseph
    Kashefi, Elham
    [J]. 2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS, 2009, : 517 - 526
  • [5] Classification of signature-only signature models
    Cao ZhengJun
    Liu MuLan
    [J]. SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2008, 51 (08): : 1083 - 1095
  • [6] Chaum David., 1982, ADV CRYPTO 82, P199, DOI DOI 10.1007/978-1-4757-0602-4
  • [7] Childs AM, 2005, QUANTUM INF COMPUT, V5, P456
  • [8] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [9] Demonstration of measurement-only blind quantum computing
    Greganti, Chiara
    Roehsner, Marie-Christine
    Barz, Stefanie
    Morimae, Tomoyuki
    Walther, Philip
    [J]. NEW JOURNAL OF PHYSICS, 2016, 18
  • [10] Grover L. K., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P212, DOI 10.1145/237814.237866