Quantum digital signature based on measurement-device-independent continuous-variable scheme

被引:0
作者
Wei Zhao
Ronghua Shi
Jinjing Shi
Xinchao Ruan
Ying Guo
Duan Huang
机构
[1] Central South University,School of Computer Science and Engineering
[2] Central South University,School of Automation
来源
Quantum Information Processing | 2021年 / 20卷
关键词
Quantum digital signature; Quantum key distribution; Continuous-variable; Measurement-device-independent; Twin signatures;
D O I
暂无
中图分类号
学科分类号
摘要
Side-channel attack is a serious impairment for the key generation processing in the continuous-variable quantum digital signature protocol. Based on measurement-device-independent components, we present a continuous-variable quantum digital signature protocol, so that the topology removes the loopholes of the practical detectors and eliminates all side-channel attacks. Without loss of generality, we consider the protocol involving three participants, whom independently decides whether to send a quantum pulse or a local oscillator pulse to the intermediate station at any time window. What’s more, we propose to employ phase-encoding and state-encoding strategies simultaneously that performing once key generation processing can obtain twin signatures. We hope the proposed protocol could further improve the performance of quantum digital signature.
引用
收藏
相关论文
共 165 条
  • [1] Lu CS(2003)Structural digital signature for image authentication: an incidental distortion resistant scheme IEEE Trans. Multimed. 5 161-173
  • [2] Liao HYM(2002)Improving the exact security of digital signature schemes J. Cryptol. 15 1-18
  • [3] Micali S(1993)New digital signature scheme based on discrete logarithm Electron. Lett. 29 396-398
  • [4] Reyzin L(1988)A digital signature scheme secure against adaptive chosen-message attacks SIAM J. Comput. 17 281-308
  • [5] Yen SM(1987)Elliptic curve cryptosystems Math. Comput. 48 203-209
  • [6] Laih CS(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Inf. Theory 31 469-472
  • [7] Goldwasser S(1978)A method for obtaining digital signatures and public-key cryptosystems Commun. ACM 21 120-126
  • [8] Micali S(1976)New directions in cryptography IEEE Trans. Inf. Theory 22 644-654
  • [9] Rivest RL(1997)Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM J. Sci. Stat. Comput. 26 1484-1509
  • [10] Koblitz N(1995)Quantum computations with cold trapped ions Phys. Rev. Lett. 74 4091-4094