The Security Problems in Some Novel Arbitrated Quantum Signature Protocols

被引:15
作者
Zhang, Long [1 ]
Sun, Hong-Wei [1 ]
Zhang, Ke-Jia [1 ,2 ,3 ]
Wang, Qing-Le [4 ]
Cai, Xiao-Qiu [5 ]
机构
[1] HeiLongJiang Univ, Sch Math Sci, Harbin 150080, Peoples R China
[2] Harbin Engn Univ, Sch Comp Sci & Technol, Harbin 150001, Peoples R China
[3] Natl Univ Singapore, Ctr Quantum Technol, 3 Sci Dr 2, Singapore 117543, Singapore
[4] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[5] Luoyang Normal Univ, Sch Math Sci, Luoyang 471934, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum cryptanalysis; Quantum signature; Arbitrated quantum signature; KEY DISTRIBUTION; QSDC PROTOCOL; ATTACK; CRYPTOGRAPHY; SECRET; SCHEME;
D O I
10.1007/s10773-017-3394-7
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
With the development of quantum signature, two improved arbitrated quantum signature(AQS) protocols have been presented with different quantum encryptions. In this paper, some security loopholes during the two AQS protocols are proposed. In the enhanced arbitrated quantum signature(EAQS) protocol, though the signer is not able to deny his signature, the receiver can still forge some valid signatures. In the chaos-based arbitrated quantum signature(CAQS) protocol, the receiver can forge a valid signature without being caught, and the signer can also deny her signature after the signing phase. Finally, some potential improved ideas are discussed.
引用
收藏
页码:2433 / 2444
页数:12
相关论文
共 53 条
[1]  
[Anonymous], AUTHENTICATION QUANT
[2]  
Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[3]   TELEPORTING AN UNKNOWN QUANTUM STATE VIA DUAL CLASSICAL AND EINSTEIN-PODOLSKY-ROSEN CHANNELS [J].
BENNETT, CH ;
BRASSARD, G ;
CREPEAU, C ;
JOZSA, R ;
PERES, A ;
WOOTTERS, WK .
PHYSICAL REVIEW LETTERS, 1993, 70 (13) :1895-1899
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[6]   The "ping-pong" protocol can be attacked without eavesdropping [J].
Cai, QY .
PHYSICAL REVIEW LETTERS, 2003, 91 (10)
[7]   CRYPTANALYSIS OF THE QUANTUM STATE SHARING PROTOCOL USING FOUR SETS OF W-CLASS STATES [J].
Chen, Xiu-Bo ;
Yang, Shuai ;
Xu, Gang ;
Su, Yuan ;
Yang, Yi-Xian .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2013, 11 (01)
[8]   Multi-party quantum secret sharing with the single-particle quantum state to encode the information [J].
Chen, Xiu-Bo ;
Niu, Xin-Xin ;
Zhou, Xin-Jie ;
Yang, Yi-Xian .
QUANTUM INFORMATION PROCESSING, 2013, 12 (01) :365-380
[9]   Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state [J].
Chen, Xiu-Bo ;
Yang, Shuai ;
Su, Yuan ;
Yang, Yi-Xian .
PHYSICA SCRIPTA, 2012, 86 (05)
[10]   Security problem on arbitrated quantum signature schemes [J].
Choi, Jeong Woon ;
Chang, Ku-Young ;
Hong, Dowon .
PHYSICAL REVIEW A, 2011, 84 (06)