The security analysis of a threshold proxy quantum signature scheme

被引:3
|
作者
Shi JianHong [1 ]
Zhang ShengLi [1 ]
Chang ZhengGang [1 ]
机构
[1] PLA Informat Engn Univ, Zhengzhou 450004, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum cryptography; quantum signature; threshold proxy signature; secret sharing; DIRECT COMMUNICATION; IDENTITY AUTHENTICATION; SECRET; ENTANGLEMENT; STATES; TELEPORTATION; SHARE; NOISE;
D O I
10.1007/s11433-013-5000-1
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In the YW threshold proxy quantum signature scheme proposed by Yang and Wen, it is found that the basic signature key is the same as the basic verification key, which means that the bitwise exclusive OR (XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys. Therefore, the proxy signers can deny their signature and the specific verifiers can forge a legal signature. Furthermore, an attacker can obtain a legal threshold proxy signature for an arbitrary new message. These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme.
引用
收藏
页码:519 / 523
页数:5
相关论文
共 50 条
  • [1] The security analysis of a threshold proxy quantum signature scheme
    SHI JianHong
    ZHANG ShengLi
    CHANG ZhengGang
    [J]. Science China(Physics,Mechanics & Astronomy), 2013, Mechanics & Astronomy)2013 (03) : 519 - 523
  • [2] The security analysis of a threshold proxy quantum signature scheme
    JianHong Shi
    ShengLi Zhang
    ZhengGang Chang
    [J]. Science China Physics, Mechanics and Astronomy, 2013, 56 : 519 - 523
  • [3] Quantum Proxy Threshold Multiple Signature Scheme
    Jing Yu
    Jianhua Zhang
    [J]. International Journal of Theoretical Physics, 2021, 60 : 2709 - 2721
  • [4] Quantum Proxy Threshold Multiple Signature Scheme
    Yu, Jing
    Zhang, Jianhua
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2021, 60 (07) : 2709 - 2721
  • [5] Security Analysis of a Paillier-based Threshold Proxy Signature Scheme
    Zheng, Minghui
    Cui, Yongquan
    Chen, Liang
    [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 683 - 687
  • [6] Security analysis and improvement of a (t, n) threshold proxy signature scheme
    Kong, Fanyu
    Yu, Jia
    Qin, Baodong
    Li, Ming
    Li, Daxing
    [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 923 - +
  • [7] Threshold proxy quantum signature scheme with threshold shared verification
    YANG YuGuang1
    2 State Key Laboratory of Networking and Switching Technology
    3 State Key Laboratory of Integrated Services Network
    4 State Key Laboratory of Information Security(Graduate University of Chinese Academy of Sciences)
    [J]. Science China(Physics,Mechanics & Astronomy), 2008, (08) : 1079 - 1088
  • [8] Threshold proxy quantum signature scheme with threshold shared verification
    YuGuang Yang
    QiaoYan Wen
    [J]. Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1079 - 1088
  • [9] Threshold proxy quantum signature scheme with threshold shared verification
    YuGuang, Yang
    QiaoYan, Wen
    [J]. SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (08): : 1079 - 1088
  • [10] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme
    Wang, Chao
    Hang, Yunpeng
    Li, Fagen
    [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +