计算机科学 ›› 2017, Vol. 44 ›› Issue (7): 104-106.doi: 10.11896/j.issn.1002-137X.2017.07.019

• 信息安全 • 上一篇    下一篇

量子多重代理盲签名协议

姚洪迪,邹海   

  1. 安徽大学计算机科学与技术学院 合肥230601,安徽大学计算机科学与技术学院 合肥230601
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受国家自然科学基金项目(61374128)资助

Quantum Multi-proxy Blind Signature Protocol

YAO Hong-di and ZOU Hai   

  • Online:2018-11-13 Published:2018-11-13

摘要: 多数情况下,原始签名人只需委托一个代理人对文件进行签名,但是为了分散代理签名人的权利,使得多人对文件进行代理签名,提出了一种量子多重代理盲签名协议。该协议利用了Bell态和Bell测量之间的关联特性,使得原始签名人可以委托多人对文件进行签名,而且签名人数可以根据实际的需求进行变化,提高了方案的灵活性。安全性分析表明,该协议能够抵制内部攻击和外部攻击,是一个安全可实现的协议。

关键词: 量子签名,多重代理签名,Bell态,Bell测量

Abstract: In most cases,the original signer only needs to entrust one proxy to sign the file.But in order to decentralize the proxy signer’s rights,more proxies are invited to make a proxy signature on the file.Based on this situation,a quantum multi-proxy blind signature protocol was proposed.The protocol,which makes use of the link between Bell state and Bell measurement,can make the original signer entrust more proxies to have a signature on the file,but also the number of signers can be changed according to actual needs,which increasingly improves the flexibility of the scheme.The security analysis shows that the protocol can resist both internal attacks and external attacks,and it is a safe and achievable protocol.

Key words: Quantum signature,Multi-proxy signature,Bell state,Bell measurement

[1] STALLINGS W.Cryptography and Network Security Principles and Practices[J].Printice Hill Publishing Pp,2005,11(7):655-660.
[2] CAO Z J,LIU M L.Classification of signature-only signature models[J].Science in China Series F:Information Sciences,2008,51(8):1083-1095.
[3] SHOR P W,PRESKILL J.Simple proof of security of the BB84 quantum key distribution protocol[J].Physical Review Letters,2000,85(2):441.
[4] HUGHES R J,MORGAN G L,PETERSON C G.Quantum key distribution over a 48km optical fibre network[J].Journal of Modern Optics,2000,47(2/3):533-547.
[5] BOSTROM K,FELBINGER T.Deterministic secure direct communication using entanglement[J].Physical Review Letters,2002,9(18):187902.
[6] ZENG G,ZHANG W.Identity verification in quantum key distribution [J].Physical Review A,2000,1(2):22301-22303.
[7] HILLERY M,BUZEK V,BERTHIAUME A.Quantum secretsharing[J].Physical Review A,1999,59(3):1829-1834.
[8] ZENG G H,MA W P,WANG X M,et al.Signature scheme based on quantum cryptography[J].Acta Electronica Sinica,2001,29(8):1098-1100.(in Chinese) 曾贵华,马文平,王新梅,等.基于量子密码的签名方案[J].电子学报,2001,29(8):1098-1100.
[9] WEN X J,LIU Y,ZHANG Z J.Signature Scheme Based onQuantum Entanglement Swapping[J].Journal of Electronics & Information Technology,2005,7(5):811-813.(in Chinese) 温晓军,刘云,张振江.基于纠缠交换的量子信息签名方案[J].电子与信息学报,2005,27(5):811-813.
[10] LI Q,CHAN W H,LONG D Y.Arbitrated quantum signature scheme using Bell states[J].Physical Review A,2009,79(5):1744-1747.
[11] WANG Y W.Cluster state quantum entangled signature scheme[J].Computer Engineering and Applications,2012,8(5):93-95.(in Chinese) 王郁武.Cluster态的量子签名方案[J].计算机工程与应用,2012,48(5):93-95.
[12] Cheng Xiao-feng.Arbitrated quantum signature with single particle[J].Chinese Journal of Quantum Electronics,2015,2(1):77-82.(in Chinese) 陈晓峰.基于单粒子的仲裁量子签名方案[J].量子电子学报,2015,32(1):77-82.
[13] SHI R H,HUANG L S,YANG W,et al.Multiparty quantum secret sharing with Bell states and Bell measurements[J].Optics Communications,2010,283(11):2476-2480.
[14] BUHRMAN H,CLEVE R,WATROUS J,et al.Quantum fingerprinting[J].Physical Review Letters,2001,87(16):167902-167904.
[15] TIAN J H,ZHANG J Z,LI Y P.A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State[J].International Journal of Theoretical Physics,2016,55(2):809-816.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!