Security of a sessional blind signature based on quantum cryptograph

被引:33
作者
Wang, Tian-Yin [1 ]
Cai, Xiao-Qiu [1 ]
Zhang, Rui-Ling [2 ]
机构
[1] Luoyang Normal Univ, Sch Math Sci, Luoyang 471022, Peoples R China
[2] Luoyang Normal Univ, Sch Informat Technol, Luoyang 471022, Peoples R China
基金
中国国家自然科学基金;
关键词
Blind signature; Sessional blind signature; Non-forgeability; Quantum cryptography; SINGLE PHOTONS; SCHEME; CRYPTANALYSIS; STATES; EFFICIENT; ATTACK;
D O I
10.1007/s11128-014-0760-8
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.
引用
收藏
页码:1677 / 1685
页数:9
相关论文
共 35 条
[1]  
[Anonymous], 1983, P ADV CRYPTOLOGY
[2]  
[Anonymous], 1994, ADV CRYPTOLOGY CRYPT
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]   Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature [J].
Cai, Xiao-Qiu ;
Wei, Chun-Yan .
QUANTUM INFORMATION PROCESSING, 2013, 12 (04) :1651-1657
[6]   PARTIALLY BLIND SIGNATURES BASED ON QUANTUM CRYPTOGRAPHY [J].
Cai, Xiao-Qiu ;
Niu, Hui-Fang .
INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2012, 26 (30)
[7]  
CHAUM D, 1988, LECT NOTES COMPUT SC, V330, P177
[8]   Efficient blind signature scheme based on quadratic residues [J].
Fan, CI ;
Lei, CL .
ELECTRONICS LETTERS, 1996, 32 (09) :811-813
[9]   Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols [J].
Gao, Fei ;
Qin, Su-Juan ;
Guo, Fen-Zhuo ;
Wen, Qiao-Yan .
IEEE JOURNAL OF QUANTUM ELECTRONICS, 2011, 47 (05) :630-635
[10]   Quantum computers can search rapidly by using almost any transformation [J].
Grover, LK .
PHYSICAL REVIEW LETTERS, 1998, 80 (19) :4329-4332