Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation
Abstract
:1. Introduction
2. Controlled Quantum Teleportation of the First Scheme
- (1)
- Alice performs BMs on particles (1,3) and (2,7). These are 16 possible outcomes.
- (2)
- Alice sends her measurement outcomes to Bob through a secure quantum channel. Bob then performs a corresponding unitary operation on particles (6,8).
- (3)
- If Charlie and David agree with Alice and Bob to complete their teleportation process, they perform the Hadamard operation on their particles, respectively. Subsequently, they perform a {,} based measurement on their particles. They then send their measurement outcomes to Bob through a secure quantum channel.
- (4)
- When the two measurements are the same, Bob will obtain the quantum state transferred from Alice. When the two measurements are different, Bob just needs to apply the unitary operation on particle 6, whereupon the same receiver obtains the quantum state transferred from Alice.
3. Quantum Multiproxy Blind Signature Scheme
3.1. Initial Phase
- (i)
- QKD. Alice shares the secret key with Bob. In addition, Bob establishes the secret keys with Charlie and with David. Moreover, Trent shares the secret keys with Alice, with Bob, with Charlie, and with David. These distribution tasks can be fulfilled via QKD protocols, which have been proved to be unconditionally safe.
- (ii)
- Quantum Channel Establishment. Bob produces quantum states and . He sends particles (3,7) to Alice, particle 4 to Charlie, and particle 5 to David, leaving particles (6,8) to himself.
- (iii)
- To ensure security of the quantum channel, Bob arranges eavesdropping checks.
3.2. Blinding the Message Phase
- (i)
- Alice converts her message m into an N-bit sequence and records . Subsequently, Alice sends the binary sequence m to Trent.
- (ii)
- Alice transforms m to by using a Hash function, where H: , and Trent also knows the Hash function H. She then blinds the message based on , where ⊕ is the XOR operation. She can identify an appropriate Hash function, such that n is an even umber. Let .
- (iii)
- Alice produces quantum states , denoted as , , …, . If ; If ; if ; if .
3.3. Authorizing and Signing Phases
- (i)
- If Alice agrees with Charlie and David as her proxy signers to sign the message, she will help to perform controlled teleportation. Alice performs the BMs on particles (1,3) and (2,7) and records the measurement outcomes as . She then encrypts with the key to obtain the secret message . Alice sends the message to Trent via the quantum channel. Similarly, Alice sends the message to Bob via the quantum channel.
- (ii)
- After Bob has received the message , he decrypts it with his to obtain the message . Bob then performs corresponding unitary operations on particles (6,8). After this, he encrypts with the keys and to obtain the secret messages and , respectively. Bob sends the messages and to Charlie and David, respectively, via the quantum channel.
- (iii)
- After Charlie and David have received the messages and , they decrypt it with their keys and to obtain the message . They then perform the Hadamard operation on their particles. Subsequently, they perform a {,} based measurement on their particles, and they note the measurement outcomes as and . Charlie then encrypts {, } with the use of the key to obtain the secret message , and David also encrypts {, } with the key to obtain the secret message . They send the messages and to Bob as the proxy authorization. Similarly, they send {, } and {, } to Trent by and .
3.4. Verifying Phases
- (i)
- Bob receives the messages , and by using the keys and to decrypt and . If in the proxy signature does not match that sent by Alice, the signature verification process will be terminated, and the signature will be declared invalid. Otherwise, the process continues based on the following steps.
- (ii)
- According to and , Bob performs an appropriate unitary operation on particle 6 to replicate the unknown state which carries the messages. He then sends the state to Trent.
- (iii)
- Trent encodes the quantum state to obtain the message . If , he confirms a series of signatures and messages . Otherwise, Trent rejects it.
4. Security Analysis and Discussion of the First Scheme
4.1. Message Blindness
4.2. Impossibility of Denial
4.3. Impossibility of Forgery
5. Controlled Quantum Teleportation of the Second Scheme
- (1)
- Alice performs BMs on particles (A,1) and Bob performs BMs on particles (B,3), respectively. These are 16 types of possible outcomes.
- (2)
- Alice sends her measurement outcomes to Bob and Charlie through the secured quantum channel. Bob sends his measurement outcomes to Alice and Charlie.
- (3)
- If Charlie agrees with Alice and Bob to complete their two-way teleportation processes, he performs a {,} based measurement on particle 4. He then sends his measurement outcomes to Alice and Bob through the secured quantum channel.
- (4)
- Bob performs a corresponding unitary operation on particle 2, whereupon Bob receives the quantum state transferred from Alice. The same applies for Alice who receives the quantum state for particle 5 transferred from Bob.
6. Quantum Two-Way Proxy Blind Signature Scheme
6.1. Initial Phase
- (i)
- QKD. Alice shares the secret key with Bob and shares the secret key with Charlie. In addition, Bob establishes the secret key with Charlie. Moreover, Trent shares the secret keys with Alice, with Bob, and with Charlie. These distribution tasks can be fulfilled via QKD protocols, which have been proven to be unconditionally secured.
- (ii)
- Quantum Channel Establishment. Bob produces quantum states . He sends particles (1,5) to Alice, particle 4 to Charlie, and leaves particles (2,3) to himself.
- (iii)
- To ensure the security of the quantum channel, Bob arranges eavesdropping checks.
6.2. Blinding the Message Phase
- (i)
- Alice converts the message into a K-bit sequence and records . Subsequently, Alice sends the binary sequence to Trent. Similarly, Bob converts the message into an R-bit sequence and records . Subsequently, Bob sends the binary sequence to Trent.
- (ii)
- Alice converts to by using the Hash function, where , , and Trent also knows the Hash function . She then blinds the message by , where ⊕ is the XOR operation. Similarly, Bob converts to by using the Hash function, where : . He then blinds the message by .
- (iii)
- Alice produces q quantum states , denoted as ,, …, . Similarly, Bob produces q quantum states , denoted as ,,…,.
6.3. Authorizing and Signing Phase
- (i)
- If Alice agrees that Charlie can act as her proxy signer to sign the message, she will help the execution of controlled teleportation. Alice performs the BM on particles (A,1) and records the measured outcomes as . She then encrypts with the keys and to obtain the secret messages and . Alice sends the messages to Bob and to Charlie via the quantum channel. Similarly, If Bob agrees that Charlie can act as his proxy signer to sign the message, he will help the execution of controlled teleportation. Bob performs the BM on particles (B,3) and records the measuring outcomes as . He then encrypts with the keys and to obtain the secret messages and . Bob sends the messages to Alice and to Charlie via the quantum channel.
- (ii)
- After Charlie has received the messages and , he decrypts them with their keys and to obtain the messages and . Charlie then performs a {,} based measurement on particle 4, and he notes the measured outcome as . Charlie encrypts {, } with the use of the key to obtain the secret message , and also encrypts {, } with the use of the key to obtain the secret message . He then sends the messages to Bob and to Alice as the proxy authorization. Similarly, Charlie sends {, } and {, } to Trent by using and , respectively.
6.4. Verifying Phases
- (i)
- Bob receives the messages , by using the key to decrypt . If in the proxy signature does not match that sent by Alice, the signature verification process will be terminated, and the signature will be declared invalid. Otherwise, continue with the steps which follow (ii and iii). Similarly, Alice receives the messages , by using the key to decrypt . If in the proxy signature does not match that sent by Bob, the signature verification process will be terminated, and the signature will be declared invalid. Otherwise, continue in accordance with the following steps.
- (ii)
- According to and , Bob performs an appropriate unitary operation on particle 2 to replicate the unknown state which carries messages. Similarly, according to and , Alice performs an appropriate unitary operation on particle 5 to replicate the unknown state which carries messages. Alice and Bob then sends the states and to Trent.
- (iii)
- Trent encodes the quantum state and obtains the message . He then compares it with . If , he confirms a series of signatures and messages . Otherwise, Trent rejects it. Similarly, Trent encodes the quantum state , obtains the message and compares it with . If , he confirms a series of signatures and messages . Otherwise, Trent rejects it.
7. Security Analysis and Discussion of the Second Scheme
7.1. Message Blindness
7.2. Impossibility of Denial
7.3. Impossibility of Forgery
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Bennett, C.H. Quantum key distribution and coin tossing. In Proceedings of the International Conference on Computers, Bangalore, India, 9–12 December 1984. [Google Scholar]
- Gobby, C.; Yuan, Z.L.; Shields, A.J. Quantum Key Distribution over 122km of Standard Telecommunication Fiber. Appl. Phys. Lett. 2004, 84, 3762–3764. [Google Scholar] [CrossRef]
- Gao, F.; Guo, F.Z.; Wen, Q.Y. Quantum Key Distribution without Alternative Measurements and Rotations. Phys. Lett. A 2006, 349, 53–58. [Google Scholar] [CrossRef] [Green Version]
- Lin, S.; Wen, Q.Y.; Zhu, F.C. Quantum Secure Direct Communication with χ-Type Entangled States. Phys. Rev. A 2008, 78, 064304. [Google Scholar] [CrossRef]
- Long, G.L.; Liu, X.S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 2002, 65, 032302. [Google Scholar] [CrossRef] [Green Version]
- Wang, J.; Zhang, Q.; Tang, C.J. Quantum Secure Direct Communication Based on Order Rearrangement of Single Photons. Phys. Lett. A 2006, 358, 256–258. [Google Scholar] [CrossRef] [Green Version]
- Xia, Y.; Song, H.S. Controlled Quantum Secure Direct Communication Using a Non-Symmetric Quantum Channel with Quantum Superdense Coding. Phys. Lett. A 2007, 364, 117–122. [Google Scholar] [CrossRef]
- Gao, F.; Liu, B.; Huang, W.; Wen, Q.Y. Postprocessing of the Oblivious Key in Quantum Private Query. IEEE J. Sel. Top. Quantum Electron. 2015, 3, 98–108. [Google Scholar] [CrossRef] [Green Version]
- Wei, C.Y.; Wang, T.Y.; Gao, F. Practical Quantum Private Query with Better Performance in Resisting Joint-Measurement Attack. Phys. Rev. A 2016, 93, 042318. [Google Scholar] [CrossRef]
- Wei, C.Y.; Cai, X.Q.; Liu, B. A Generic Construction of Quantum-Oblivious-Key-Transfer-Based Private Query with Ideal Database Security and Zero Failure. IEEE Trans. Comput. 2018, 67, 2–8. [Google Scholar] [CrossRef] [Green Version]
- Chen, X.B.; Niu, X.X.; Zhou, X.J.; Yang, Y.X. Multi-Party Quantum Secret Sharing with the Singleparticle Quantum State to Encode the Information. Quantum Inf. Process. 2013, 12, 365–380. [Google Scholar] [CrossRef]
- Hillery, M.; Buzek, V.; Berthiaume, A. Quantum Secret Sharing. Phys. Rev. A 1999, 59, 1829. [Google Scholar] [CrossRef] [Green Version]
- Bogdanski, J.; Rafiei, N.; Bourennane, M. Experimental Quantum Secret Sharing Using Telecommunication Fiber. Phys. Rev. A 2008, 78, 062307. [Google Scholar] [CrossRef]
- Li, X.H.; Zhou, P.; Li, C.Y.; Zhou, H.Y.; Deng, F.G. Efficient Symmetric Multiparty Quantum State Sharing of an Arbitrary M-Qubit State. J. Phys. At. Mol. Opt. Phys. 2006, 39, 1975. [Google Scholar] [CrossRef] [Green Version]
- Loukopoulos, K.; Browne, D.E. Secure Multiparty Computation with a Dishonest Majority via Quantum Means. Phys. Rev. A 2010, 81, 062336. [Google Scholar] [CrossRef] [Green Version]
- Fujiwara, A. Quantum Channel Identification Problem. Phys. Rev. A 2001, 63, 042304. [Google Scholar] [CrossRef] [Green Version]
- Lee, H.; Lim, J.; Yang, H.J. Quantum Direct Communication with Authentication. Phys. Rev. A 2006, 73, 042305. [Google Scholar] [CrossRef] [Green Version]
- Curty, M.; Santos, D.J. Quantum Authentication of Classical Messages. Phys. Rev. A 2001, 64, 062309. [Google Scholar] [CrossRef] [Green Version]
- Zhang, H.Y.; Zhang, L.; Zhang, K.J. A New Quantum Proxy Signature Model Based on a Series of Genuine Entangled States. Int. J. Theor. Phys. 2019, 58, 591–604. [Google Scholar] [CrossRef]
- Gao, F.; Guo, F.Z.; Wen, Q.Y.; Zhu, F.C. Comment on Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Phys. Rev. Lett. 2008, 101, 208901. [Google Scholar] [CrossRef]
- Chen, X.B.; Yang, S.; Xu, G.; Su, Y.; Yang, Y.X. Cryptanalysis of the Quantum State Sharing Protocol Using Four Sets of W-Class States. Int. J. Quantum Inf. 2013, 11, 1350010. [Google Scholar] [CrossRef]
- Zhang, Y.S.; Li, C.F.; Guo, G.C. Comment on Quantum Key Distribution without Alternative Measurements. Phys. Rev. A 2001, 63, 036301. [Google Scholar] [CrossRef] [Green Version]
- Gao, F.; Qin, S.J.; Wen, Q.Y.; Zhu, F.C. A Simple Participant Attack on the Bradler-Dusek Protocol. Quantum Inf. Comput. 2007, 7, 329–334. [Google Scholar] [CrossRef]
- Gao, F.; Wen, Q.Y.; Zhu, F.C. Teleportation Attack on the QSDC Protocol with a Random Basis and Order. Chin. Phys. B. 2008, 17, 3189. [Google Scholar]
- Gao, F.; Qin, S.J.; Guo, F.Z.; Wen, Q.Y. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols. IEEE J. Quantum Electron. 2011, 47, 630–635. [Google Scholar]
- Hao, L.; Li, J.L.; Long, G.L. Eavesdropping in a Quantum Secret Sharing Protocol Based on Grover Algorithm and its Solution. Science China Physics. Mech. Astron. 2010, 53, 491–495. [Google Scholar] [CrossRef]
- Qin, S.J.; Ga, F.; Wen, Q.Y.; Zhu, F.C. Improving the Security of Multiparty Quantum Secret Sharing Against an Attack with a Fake Signal. Phys. Lett. A 2006, 357, 101–103. [Google Scholar] [CrossRef]
- Wojcik, A. Eavesdropping on the Ping-Pong Quantum Communication Protocol. Phys. Rev. Lett. 2003, 90, 157901. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Cai, Q.Y. The Ping-Pong Protocol Can Be Attacked without Eavesdropping. Phys. Rev. Lett. 2003, 91, 109801. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Gao, F.; Guo, F.Z.; Wen, Q.Y.; Zhu, F.C. Consistency of Shared Reference Frames Should Be Reexamined. Phys. Rev. A 2008, 77, 014302. [Google Scholar] [CrossRef] [Green Version]
- Gao, F.; Qin, S.J.; Wen, Q.Y.; Zhu, F.C. Cryptanalysis of Multiparty Controlled Quantum Secure Direct Communication Using Greenberger-Horne-Zeilinger State. Opt. Commun. 2010, 283, 192–195. [Google Scholar] [CrossRef]
- Gao, F.; Lin, S.; Wen, Q.Y.; Zhu, F.C. A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol. Chin. Phys. Lett. 2008, 25, 1561. [Google Scholar]
- Gisin, N.; Fasel, S.; Kraus, B.; Zbinden, H.; Ribordy, G. Trojan Horse Attacks on Quantum Key Distribution Systems. Phys. Rev. A 2006, 73, 022320. [Google Scholar] [CrossRef] [Green Version]
- Deng, F.G.; Li, X.H.; Zhou, H.Y.; Zhang, Z.J. Improving the Security of Multi-party Quantum Secret Sharing Against Trojan Horse Attack. Phys. Rev. A 2005, 72, 044302. [Google Scholar] [CrossRef]
- Gao, F.; Guo, F.Z.; Wen, Q.Y.; Zhu, F.C. Revisiting the Security of Quantum Dialogue and Bidirectional Quantum Secure Direct Communication. Sci. China Ser. Phys. Mech. Astron. 2008, 51, 559–566. [Google Scholar] [CrossRef] [Green Version]
- Wang, T.Y.; Wen, Q.Y.; Zhu, F.C. Cryptanalysis of Multiparty Quantum Secret Sharing with Bell States and Bell Measurements. Opt. Commun. 2011, 284, 1711–1713. [Google Scholar] [CrossRef]
- Cai, X.Q.; Niu, H.F. Partially Blind Signature Based on Quantum Cryptography. Int. J. Mod. Phys. B 2012, 26, 1250163. [Google Scholar] [CrossRef]
- Su, Q.; Huang, Z.; Wen, Q.Y.; Li, W.M. Quantum Blind Signature Based on Two-State Vector Formalism. Opt. Commun. 2010, 283, 4408–4410. [Google Scholar]
- Cao, H.J.; Huang, J.; Yu, Y.F.; Jiang, X.L. A Quantum Proxy Signature Scheme Based on Genuine Five-Qubit Entangled State. Int. J. Theor. Phys. 2014, 53, 3095–3100. [Google Scholar] [CrossRef]
- Zhou, J.X.; Zhou, Y.J.; Niu, X.X.; Yang, Y.X. Quantum Proxy Signature with Public Verifiability. Sci. China Phys. Mech. Astron. 2011, 54, 1828–1832. [Google Scholar] [CrossRef]
- Wen, X.J.; Liu, Y. A Realizable Quantum Sequential Multi-Signature Scheme. Acta Electron. Sin. 2007, 35, 1079. [Google Scholar]
- Wen, X.J.; Liu, Y.; Zhou, N.R. Realizable Quantum Broadcasting Multi-Signature Scheme. Int. J. Mod. Phys. B 2008, 22, 4251–4259. [Google Scholar] [CrossRef]
- Wen, X.J.; Tian, Y.; Ji, L.P.; Niu, X.M. A Group Signature Scheme Based on Quantum Teleportation. Phys. Scr. 2010, 81, 055001. [Google Scholar] [CrossRef]
- Xu, R.; Huang, L.S.; Yang, W.; He, L.B. Quantum Group Blind Signature Scheme without Entanglement. Opt. Commun. 2011, 284, 3654–3658. [Google Scholar] [CrossRef]
- Zhang, K.J.; Song, T.T.; Zuo, H.J.; Zhang, W.W. A Secure Quantum Group Signature Scheme Based on Bell States. Phys. Scr. 2013, 87, 045012. [Google Scholar] [CrossRef]
- Zhang, K.J.; Sun, Y.; Song, T.T.; Zuo, H.J. Cryptanalysis of the Quantum Group Signature Protocols. Int. J. Theor. Phys. 2013, 52, 4163–4173. [Google Scholar] [CrossRef]
- Diffie, W.; Hellman, M. New directions in cryptography. IEEE Trans. Inf. Theory 1976, 22, 644. [Google Scholar] [CrossRef] [Green Version]
- Merkle, R. Authentication, and Public Key Systems; Stanford University: Stanford, CA, USA, 1979. [Google Scholar]
- Wang, T.Y.; Ma, J.F.; Cai, X.Q. The postprocessing of quantum digital signatures. Quantum Inf. Process. 2017, 16, 19. [Google Scholar] [CrossRef]
- Wang, T.Y.; Cai, X.Q.; Zhang, R.L. Security of a sessional blind signature based on quantum cryptograph. Quantum Inf. Process. 2014, 13, 1677–1685. [Google Scholar] [CrossRef]
- Du, H.; Wen, Q. Certificateless proxy multi-signature. Inf. Sci. 2014, 276, 21–30. [Google Scholar] [CrossRef]
- Mambo, M.; Usuda, K.; Okamoto, E. Proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundam. A 1996, 79, 1338–1354. [Google Scholar]
- Wang, T.Y.; Wei, Z.L. One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 2012, 11, 455–463. [Google Scholar] [CrossRef]
- Yang, C.W.; Luo, Y.P.; Hwang, T. Forgery attack on one-time proxy signature and the improvement. Quantum Inf. Process. 2014, 13, 2007–2016. [Google Scholar] [CrossRef]
- Wang, T.Y.; Wei, Z.L. Analysis of forgery attack on one-time proxy signature and the improvement. Int. J. Theor. Phys 2015, 55, 743–745. [Google Scholar] [CrossRef]
- Cao, H.J.; Wang, H.S.; Li, P.F. Quantum proxy multi-signature scheme using genuinely entangled six qubits state. Int. J. Theor. Phys. 2013, 52, 1188–1193. [Google Scholar] [CrossRef]
- Zhang, L.; Zhang, H.Y.; Zhang, K.J.; Wang, Q.L. The security analysis and improvement of some novel quantum proxy signature scheme. Int. J. Theor. Phys. 2017, 56, 1983–1994. [Google Scholar] [CrossRef]
- Tian, J.H.; Zhang, J.Z.; Li, Y.P. A quantum multi-proxy blind signature scheme based on genuine fourqubit entangled state. Int. J. Theor. Phys. 2016, 55, 809–816. [Google Scholar] [CrossRef]
- Chaum, D.; Rivest, R.L.; Sherman, A.T. Blind Signatures for Untraceable Payments. In Advances in Cryptology; Springer: Boston, MA, USA, 1983; pp. 199–203. [Google Scholar]
- Peng, T. Research on Controlled Teleportation of Two-Particle and Three-Particle Entanglement. Master’s Thesis, Huazhong University of Science and Technology, Wuhan, China, 2007. [Google Scholar]
- Zheng, X.Y. Controlled two-way quantum teleportation based on five particle cluster state. Chin. J. Quantum Electron. 2016, 33, 177. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Luo, Q.; Zhang, T.; Huang, X.; Jing, N. Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation. Entropy 2022, 24, 1421. https://doi.org/10.3390/e24101421
Luo Q, Zhang T, Huang X, Jing N. Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation. Entropy. 2022; 24(10):1421. https://doi.org/10.3390/e24101421
Chicago/Turabian StyleLuo, Qiming, Tinggui Zhang, Xiaofen Huang, and Naihuan Jing. 2022. "Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation" Entropy 24, no. 10: 1421. https://doi.org/10.3390/e24101421
APA StyleLuo, Q., Zhang, T., Huang, X., & Jing, N. (2022). Two Quantum Proxy Blind Signature Schemes Based on Controlled Quantum Teleportation. Entropy, 24(10), 1421. https://doi.org/10.3390/e24101421