Security Problems in the Quantum Signature Scheme with a Weak Arbitrator

被引:0
|
作者
Xiangfu Zou
Daowen Qiu
Fang Yu
Paulo Mateus
机构
[1] Wuyi University,School of Mathematics and Computational Science
[2] Sun Yat-sen University,Department of Computer Science
[3] Technical University of Lisbon,SQIG–Instituto de Telecomunicações, Departamento de Matemática, Instituto Superior Técnico
关键词
Quantum cryptography; Quantum signature; Arbitrated quantum signature; Known message attack;
D O I
暂无
中图分类号
学科分类号
摘要
Very recently, a quantum signature scheme with weak arbitrator was presented (Luo et al. in Int. J. Theor. Phys. 51:2135–2142, 2012). A weak arbitrator is only involved in the disagreement case, which means that the scheme is costless. In this paper, the security of the quantum signature scheme with weak arbitrator is analyzed. We show that attackers can counterfeit a signature for any message, which will pass the verification for the signer. In addition, they can counterfeit a signature for any one of the 4L (L is the length of the intercepted quantum message) messages by employing the known message attack, which will pass the verification for the signed message. In particular, by employing the Z-transform attack, the attackers can forge a signature for any one of the 2L messages, which will pass the verifications for both the signer and the signed message successfully.
引用
收藏
页码:603 / 611
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme
    Zhang, Ke-Jia
    Jia, Heng-Yue
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2015, 54 (02) : 582 - 588
  • [22] Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme
    Ke-Jia Zhang
    Heng-Yue Jia
    International Journal of Theoretical Physics, 2015, 54 : 582 - 588
  • [23] Security Analysis of One Quantum Digital Signature Scheme
    Cao, Zhengjun
    Markowitch, Olivier
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1574 - 1576
  • [24] The security analysis of a threshold proxy quantum signature scheme
    Shi JianHong
    Zhang ShengLi
    Chang ZhengGang
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2013, 56 (03) : 519 - 523
  • [25] Security analysis and improvement of an arbitrated quantum signature scheme
    Xin, Xiangjun
    He, Qianqian
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    OPTIK, 2019, 189 : 23 - 31
  • [26] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523
  • [27] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    Science China(Physics,Mechanics & Astronomy), 2013, (03) : 519 - 523
  • [28] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xiangjun Xin
    Li Ding
    Qinglan Yang
    Chaoyang Li
    Tianyuan Zhang
    Yongxuan Sang
    Quantum Information Processing, 21
  • [29] Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
    Xin, Xiangjun
    Ding, Li
    Yang, Qinglan
    Li, Chaoyang
    Zhang, Tianyuan
    Sang, Yongxuan
    QUANTUM INFORMATION PROCESSING, 2022, 21 (07)
  • [30] Implementation of the scheme of a quantum information signature based on weak nonlinearity
    Ding Dong
    Yan Feng-Li
    ACTA PHYSICA SINICA, 2013, 62 (01)