Quantum (t, n) threshold signature based on logistic chaotic sequences and mutually unbiased bases

被引:1
作者
Zhang, Yaodong [1 ]
Fang, Hailan [2 ]
Liu, Feng [3 ]
机构
[1] Shandong Technol & Business Univ, Coll Comp Sci & Technol, Yantai 264005, Peoples R China
[2] Hlth Comprehens Serv Ctr, Yantai 264001, Peoples R China
[3] Shandong Technol & Business Univ, Coll Math & Informat Sci, Yantai 264005, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum; (t; n) threshold signature; Logistic chaotic sequences; Mutually unbiased bases; Collusive attacks;
D O I
10.1007/s11128-024-04366-1
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A quantum (t, n) threshold signature (QTS) based on Logistic Chaotic sequences and mutually unbiased bases is proposed, taking advantage of the pseudo-randomness of chaotic sequences and the cyclic characteristics of d-dimensional mutually unbiased bases. In this scheme, only t or more signatories can produce a valid signature on behalf of a signature group consisting of n members. The scheme uses a Logistic Chaotic mapping to generate a chaotic sequence, for which a particle swapping algorithm is used to obtain a position sequence, combined with a generalized Pauli operator to encrypt the message. Also, mutually unbiased bases in d-dimensional Hilbert space are used to verify the threshold value in the scheme. Security analysis proves that the proposed scheme satisfies signature non-repudiation and is resistant to collusive attacks by disloyal signing members. By comparing to existing QTS schemes, the proposed QTS scheme can reduce the resources consumed in the signing phase. The number of particles in the scheme does not increase as the number of signing members increases, except for local operations. That increases the scalability of the signature scheme.
引用
收藏
页数:16
相关论文
共 29 条
[1]   From Bell's theorem to secure quantum key distribution [J].
Acin, Antonio ;
Gisin, Nicolas ;
Masanes, Lluis .
PHYSICAL REVIEW LETTERS, 2006, 97 (12)
[2]  
Aigner Martin., 1999, PROOFS BOOK, P1
[3]   Optimal encryption of quantum bits [J].
Boykin, PO ;
Roychowdhury, V .
PHYSICAL REVIEW A, 2003, 67 (04) :6
[4]   Quantum fingerprinting [J].
Buhrman, H ;
Cleve, R ;
Watrous, J ;
de Wolf, R .
PHYSICAL REVIEW LETTERS, 2001, 87 (16)
[5]   Security of quantum key distribution using d-level systems -: art. no. 127902 [J].
Cerf, NJ ;
Bourennane, M ;
Karlsson, A ;
Gisin, N .
PHYSICAL REVIEW LETTERS, 2002, 88 (12) :4-127902
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]   Multiparty quantum secret sharing scheme based on the phase shift operations [J].
Du, Yu-tao ;
Bao, Wan-su .
OPTICS COMMUNICATIONS, 2013, 308 :159-163
[8]   Cryptanalysis of the arbitrated quantum signature protocols [J].
Gao, Fei ;
Qin, Su-Juan ;
Guo, Fen-Zhuo ;
Wen, Qiao-Yan .
PHYSICAL REVIEW A, 2011, 84 (02)
[9]   A novel quantum (t, n) threshold group signature based on d-dimensional quantum system [J].
Gao, Mingzhu ;
Yang, Wei ;
Liu, Yang .
QUANTUM INFORMATION PROCESSING, 2021, 20 (09)
[10]  
Gottesman D., 2001, Quantum digital signatures, DOI DOI 10.48550/ARXIV.QUANT-PH/0105032