A secure and efficient identity-based quantum signature scheme

被引:1
|
作者
Liu, Bai [1 ]
Zhu, Pengda [1 ]
Guo, Kuikui [1 ]
机构
[1] Hubei Univ Technol, Sch Comp Sci, Wuhan 430068, Peoples R China
基金
中国国家自然科学基金;
关键词
CLASSICAL MESSAGES;
D O I
10.1063/5.0212258
中图分类号
TB3 [工程材料学];
学科分类号
0805 ; 080502 ;
摘要
In recent years, identity-based quantum signature protocols have received much attention due to their unique advantages. Based on Bell states, we propose an efficient identity-based quantum signature scheme. In our scheme, the signer's private key is generated from their identity information. The signer uses the private key and secret parameters to generate a signature for the verifier. The verifier, who possesses the identity information of the signer, can authenticate the signature. Our proposed scheme ensures signature non-forgeability and non-repudiation. In addition, the protocol does not require the preparation of long-term quantum memory or the performance of quantum swap tests, making it more efficient than previous schemes.<br /> (c) 2024 Author(s). All article content, except where otherwise noted, is licensed under a Creative Commons Attribution (CC BY) license(https://creativecommons.org/licenses/by/4.0/).
引用
收藏
页数:7
相关论文
共 50 条
  • [41] An efficient and provable secure identity-based ring signcryption scheme
    Zhu, ZhenChao
    Zhang, Yuqing
    Wang, Fengjiao
    [J]. COMPUTER STANDARDS & INTERFACES, 2009, 31 (06) : 1092 - 1097
  • [42] An Efficient and Provable Secure Revocable Identity-Based Encryption Scheme
    Wang, Changji
    Li, Yuan
    Xia, Xiaonan
    Zheng, Kangjia
    [J]. PLOS ONE, 2014, 9 (09):
  • [43] An Efficient Identity-Based Homomorphic Signature Scheme for Network Coding
    Zhang, Yudi
    Jiang, Yan
    Li, Bingbing
    Zhang, Mingwu
    [J]. ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 524 - 531
  • [44] Efficient Signature Scheme with Batch Verifications in Identity-Based Framework
    Gopal, P. V. S. S. N.
    Reddy, P. Vasudeva
    Gowri, T.
    [J]. ETRI JOURNAL, 2016, 38 (02) : 397 - 404
  • [45] Comment on "An efficient identity-based signature scheme with provable security"
    Tan, Syh-Yuan
    Heng, Swee-Huay
    [J]. INFORMATION SCIENCES, 2024, 659
  • [46] Efficient identity-based signature scheme with partial message recovery
    Li, Yong
    Chen, Huiyan
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 883 - +
  • [47] Post-Quantum Secure Identity-Based Signature Scheme with Lattice Assumption for Internet of Things Networks
    Zhang, Yang
    Tang, Yu
    Li, Chaoyang
    Zhang, Hua
    Ahmad, Haseeb
    [J]. SENSORS, 2024, 24 (13)
  • [48] Efficient Generic Construction of Forward-Secure Identity-Based Signature
    Al Ebri, Noura
    Baek, Joonsang
    Shoufan, Abdulhadi
    Quang Hieu Vu
    [J]. 2012 SEVENTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2012, : 55 - 64
  • [49] Efficient forward secure identity-based shorter signature from lattice
    Zhang, Xiaojun
    Xu, Chunxiang
    Jin, Chunhua
    Xie, Run
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (06) : 1963 - 1971
  • [50] Secure and Efficient Identity-Based Proxy Signature Scheme in the Standard Model Based on Computational Diffie–Hellman Problem
    Xiaoming Hu
    Xiaojun Zhang
    Jian Wang
    Huajie Xu
    Wenan Tan
    Yinchun Yang
    [J]. Arabian Journal for Science and Engineering, 2017, 42 : 639 - 649