Quantum designated verifier signature based on Bell states

被引:13
|
作者
Xin, Xiangjun [1 ]
Wang, Zhuo [1 ]
Yang, Qinglan [2 ]
Li, Fagen [3 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
[3] Univ Elect Sci & Technol China, Sch Comp Sci & Engn, Chengdu 611731, Peoples R China
关键词
Quantum signature; Designated verifier; Non-transferability; Unforgeability; Bell states; KEY DISTRIBUTION; SCHEME; IMPROVEMENT; ENCRYPTION;
D O I
10.1007/s11128-019-2574-1
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, Shi et al. proposed two quantum designated verifier signature (QDVS) schemes. First, we demonstrate the forgery attack and repudiation attack to Shi et al.'s quantum QDVS schemes. Then, a new QDVS scheme based on Bell states is proposed. Our scheme overcomes the security drawbacks of Shi et al.'s scheme. It is secure against forgery attack, repudiation attack, inter-resending attack, impersonation attack and Trojan horse attack. What is more, our scheme has a strong security. It can be proved to be information-theoretically secure. Our scheme also has the properties such as designated verification, non-transferability and hiding source. On the other hand, in our scheme, the partners need not use any quantum one-way function or perform any quantum state comparison algorithm. The qubit efficiency of our scheme can achieve 66.7%. Therefore, our scheme is more secure and efficient than the similar schemes.
引用
收藏
页数:17
相关论文
共 50 条
  • [41] Designated verifier proxy signature scheme
    Liao, Yongjian
    Lu, Qing
    Qin, Zhiguang
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238
  • [42] A Certificateless Designated Verifier Sanitizable Signature
    Zhan, Yonghua
    Yi, Bixia
    Yang, Yang
    He, Renjie
    Shi, Rui
    FRONTIERS IN CYBER SECURITY, FCS 2023, 2024, 1992 : 337 - 352
  • [43] A Restricted Undeniable Designated Verifier Signature
    Koide, Atsushi
    Tso, Raylin
    Okamoto, Takeshi
    Okamoto, Eiji
    2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 1375 - +
  • [44] AN EFFICIENT CERTIFICATE-BASED DESIGNATED VERIFIER SIGNATURE SCHEME
    Li, Jiguo
    Qian, Na
    Zhang, Yichen
    Huang, Xinyi
    COMPUTING AND INFORMATICS, 2016, 35 (05) : 1210 - 1230
  • [45] A novel ID-based designated verifier signature scheme
    Zhang, Jianhong
    Mao, Jane
    INFORMATION SCIENCES, 2008, 178 (03) : 766 - 773
  • [46] ECC-based new designated verifier signature scheme
    Key Lab. of Network and Information Security, College of Armed Police Force Engineering, Xi'an 710086, China
    不详
    Jiefangjun Ligong Daxue Xuebao, 2009, 3 (228-231):
  • [47] A new code-based designated verifier signature scheme
    Thanalakshmi, Perumal
    Anitha, Ramalingam
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (17)
  • [48] Identity-based strong designated verifier signature schemes
    Susilo, W
    Zhang, FG
    Mu, Y
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2004, 3108 : 313 - 324
  • [49] Delegatability of an Identity Based Strong Designated Verifier Signature Scheme
    Sun, Xun
    Li, Jianhua
    Yin, Hu
    Chen, Gongliang
    INFORMATICA, 2010, 21 (01) : 117 - 122
  • [50] A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing
    Lee, Cheng-Chi
    Lai, Yan-Ming
    Chen, Chin-Ling
    Chen, Lung Albert
    INFORMATION TECHNOLOGY AND CONTROL, 2013, 42 (03): : 247 - 252