Computer Science ›› 2017, Vol. 44 ›› Issue (7): 104-106.doi: 10.11896/j.issn.1002-137X.2017.07.019

Previous Articles     Next Articles

Quantum Multi-proxy Blind Signature Protocol

YAO Hong-di and ZOU Hai   

  • Online:2018-11-13 Published:2018-11-13

Abstract: In most cases,the original signer only needs to entrust one proxy to sign the file.But in order to decentralize the proxy signer’s rights,more proxies are invited to make a proxy signature on the file.Based on this situation,a quantum multi-proxy blind signature protocol was proposed.The protocol,which makes use of the link between Bell state and Bell measurement,can make the original signer entrust more proxies to have a signature on the file,but also the number of signers can be changed according to actual needs,which increasingly improves the flexibility of the scheme.The security analysis shows that the protocol can resist both internal attacks and external attacks,and it is a safe and achievable protocol.

Key words: Quantum signature,Multi-proxy signature,Bell state,Bell measurement

[1] STALLINGS W.Cryptography and Network Security Principles and Practices[J].Printice Hill Publishing Pp,2005,11(7):655-660.
[2] CAO Z J,LIU M L.Classification of signature-only signature models[J].Science in China Series F:Information Sciences,2008,51(8):1083-1095.
[3] SHOR P W,PRESKILL J.Simple proof of security of the BB84 quantum key distribution protocol[J].Physical Review Letters,2000,85(2):441.
[4] HUGHES R J,MORGAN G L,PETERSON C G.Quantum key distribution over a 48km optical fibre network[J].Journal of Modern Optics,2000,47(2/3):533-547.
[5] BOSTROM K,FELBINGER T.Deterministic secure direct communication using entanglement[J].Physical Review Letters,2002,9(18):187902.
[6] ZENG G,ZHANG W.Identity verification in quantum key distribution [J].Physical Review A,2000,1(2):22301-22303.
[7] HILLERY M,BUZEK V,BERTHIAUME A.Quantum secretsharing[J].Physical Review A,1999,59(3):1829-1834.
[8] ZENG G H,MA W P,WANG X M,et al.Signature scheme based on quantum cryptography[J].Acta Electronica Sinica,2001,29(8):1098-1100.(in Chinese) 曾贵华,马文平,王新梅,等.基于量子密码的签名方案[J].电子学报,2001,29(8):1098-1100.
[9] WEN X J,LIU Y,ZHANG Z J.Signature Scheme Based onQuantum Entanglement Swapping[J].Journal of Electronics & Information Technology,2005,7(5):811-813.(in Chinese) 温晓军,刘云,张振江.基于纠缠交换的量子信息签名方案[J].电子与信息学报,2005,27(5):811-813.
[10] LI Q,CHAN W H,LONG D Y.Arbitrated quantum signature scheme using Bell states[J].Physical Review A,2009,79(5):1744-1747.
[11] WANG Y W.Cluster state quantum entangled signature scheme[J].Computer Engineering and Applications,2012,8(5):93-95.(in Chinese) 王郁武.Cluster态的量子签名方案[J].计算机工程与应用,2012,48(5):93-95.
[12] Cheng Xiao-feng.Arbitrated quantum signature with single particle[J].Chinese Journal of Quantum Electronics,2015,2(1):77-82.(in Chinese) 陈晓峰.基于单粒子的仲裁量子签名方案[J].量子电子学报,2015,32(1):77-82.
[13] SHI R H,HUANG L S,YANG W,et al.Multiparty quantum secret sharing with Bell states and Bell measurements[J].Optics Communications,2010,283(11):2476-2480.
[14] BUHRMAN H,CLEVE R,WATROUS J,et al.Quantum fingerprinting[J].Physical Review Letters,2001,87(16):167902-167904.
[15] TIAN J H,ZHANG J Z,LI Y P.A Quantum Multi-proxy Blind Signature Scheme Based on Genuine Four-Qubit Entangled State[J].International Journal of Theoretical Physics,2016,55(2):809-816.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!