Log in

A Novel Quantum Proxy Blind Signature Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

A novel quantum proxy blind signature scheme is proposed. In this scheme, a special type of non-maximally entangled three-qubit state is introduced as a quantum channel, which can realize perfect teleportation. The message sender U blinds his message by means of preparing two groups of non-orthogonal single-photon states. According to the original signer Charlie’s delegation message, the proxy signer Alice generates a corresponding signature. The arbitrator Trent can help the receiver Bob verify the signature, and also prevent Bob from doing any damage. The above-mentioned advantages make this scheme different from some existing schemes. It is showed that our scheme has the properties of undeniability, unforgeability, blindness, untraceability. Moreover, it is free from intercept-resend attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp. 175–179 (1984)

  2. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  3. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  4. Boykin, P.O., Boychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)

    Article  ADS  Google Scholar 

  5. Oppenheim, J., Horodecki, M.: How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information. Phys. Rev. A 72, 042309 (2005)

    Article  ADS  Google Scholar 

  6. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18, 3189–3192 (2009)

    Article  ADS  Google Scholar 

  7. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282, 3382–3385 (2009)

    Article  ADS  Google Scholar 

  8. Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  9. Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the singleparticle quantum state to encode the information. Quantum Inf. Process. 12, 365–380 (2013)

  10. Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state. Quantum Inf. Process. 12, 1299–1306 (2013)

    Article  ADS  MATH  Google Scholar 

  11. Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication using the Einstein-podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)

    Article  ADS  Google Scholar 

  12. Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)

    Article  ADS  Google Scholar 

  13. Cai, Q.Y., Li, B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601–603 (2004)

    Article  ADS  Google Scholar 

  14. Wang, J., Zhang, Q., Tang, C.J.: Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 266, 732–737 (2006)

    Article  ADS  Google Scholar 

  15. Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)

    Article  ADS  Google Scholar 

  16. Curty, M., Lütkenhaus, N.: Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 77, 046301 (2008)

  17. Zeng, G.H.: Reply to Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 78, 016301 (2008)

  18. Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 321, 295–300 (2004)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  19. Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: Arbitrated quantum signature scheme with meesage recovery. Phys. Lett. A 347, 262–263 (2005)

  20. Wen, X.J., Liu, Y.: A realizable quantum sequential multi-signature scheme. Acta Electron. Sin. 35, 1079–1083 (2007)

    Google Scholar 

  21. Wen, X.J., Liu, Y., Zhou, N.R.: Realizable quantum broadcasting multi-signature scheme. Int. J. Mod. Phys. B 22, 4251–4259 (2008)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  22. Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)

    Article  ADS  MATH  Google Scholar 

  23. Chaum, D.: Blind Signature for Untraceable Payments. In: Advances in Cryptology Proceedings of Crypto’82, pp 199–203. Springer-Verlag (1983)

  24. Wen, X.J., Niu, X.M., Ji, L.P., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282, 666–669 (2009)

    Article  ADS  Google Scholar 

  25. Naseri, M.: A weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6, 5051–5053 (2011)

    MathSciNet  Google Scholar 

  26. Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)

    Article  ADS  Google Scholar 

  27. He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21, 030306 (2012)

    Article  ADS  Google Scholar 

  28. Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. 56, 1636–1641 (2013)

    Article  Google Scholar 

  29. Cai, X.Q., Niu, H.F.: Partially blind signature based on quantum cryptography. Int. J. Mod. Phys. B 26, 1250163 (2012)

    Article  ADS  MATH  Google Scholar 

  30. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures: Delegation of the power to sign messages. IEICE Trans. Fundam. E79-A, 1338–1354 (1996)

    Google Scholar 

  31. Cao, H.J., Huang, J., Yu, Y.F., Jiang, X.L.: A quantum proxy signature scheme based on genuine five-qubit entangled state. Int. J. Theor. Phys. 53, 3095–3100 (2014)

    Article  MATH  Google Scholar 

  32. Zhou, J.X., Zhou, Y.J., Niu, X.X., Yang, Y.X.: Quantum proxy signature with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828–1832 (2011)

    Article  ADS  Google Scholar 

  33. Zou, X., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)

    Article  ADS  Google Scholar 

  34. Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)

    Article  ADS  MathSciNet  Google Scholar 

  35. Hwang, T., Luo, Y.P., Chong, S.K.: Comment on Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 85, 056301 (2012)

  36. Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54, 582–588 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  37. Su, Q., Li, W.M.: Improved group signature scheme based on quantum teleportation. Int. J. Theor. Phys. 53, 1208–1216 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  38. Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on Experimental demonstration of a quantum protocol for Byzantine agreement and Liar detection. Phys. Rev. Lett. 101, 208901 (2008)

  39. Tian, Y., Chen, H., Ji, S.F., Han, Z.P., Lian, H.G., Wen, X.J.: A broadcasting multiple blind signature scheme based on quantum teleportation. Opt. Quant. Electron. 46, 769–777 (2014)

    Article  Google Scholar 

  40. Wen, X.J., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62a, 147–151 (2007)

    ADS  MATH  Google Scholar 

  41. Zuo, H.J., Zhang, K.J., Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process 12, 2343–2353 (2013)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  42. Zhang, W., Qiu, D.W., Zou, X.F.: Improvement of a quantum broadcasting multiple blind signature scheme based on quantum teleportation. Quantum Inf. Process 15, 2499–2519 (2016)

    Article  ADS  MathSciNet  MATH  Google Scholar 

  43. Cao, H.J., Zhu, Y.Y., Li, P.F.: A quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 53, 419–425 (2014)

    Article  MATH  Google Scholar 

  44. Cao, H.J., Yu, Y.F., Song, Q., Gao, L.X.: A quantum proxy weak blind signature scheme based on controlled quantum teleportation. Int. J. Theor. Phys. 54, 1325–1333 (2015)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Natural Science Foundation of China (Grant Nos. 61273311 and 61402275), the Natural Science Basic Research Plan of Shaanxi Province of China (Grant No. 2015JM6263), the Special Foundation for Basic Research Funding of the Central Higher Education of China (Grant No. GK201402004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian-Zhong Zhang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Guo, W., **e, SC. & Zhang, JZ. A Novel Quantum Proxy Blind Signature Scheme. Int J Theor Phys 56, 1708–1718 (2017). https://doi.org/10.1007/s10773-017-3316-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-017-3316-8

Keywords

Navigation