Comments on the "Efficient quantum multi-proxy signature"

被引:5
|
作者
Tan, Ruimei [1 ]
Yang, Qinglan [2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
关键词
Quantum signature; Proxy signature; Proxy attack; Chosen-signature attack; SCHEME;
D O I
10.1007/s11128-020-02783-6
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency. Unfortunately, it is not secure against proxy attacks and forgery attack. In this paper, first, the proxy attacks for the quantum proxy signature scheme are introduced. We demonstrate that every proxy signer can delegate the proxy signing power to a malicious arbitrator, who can sign any message on behalf of all the proxy signers. At the same time, the original signer can also impersonate the proxy signer to generate a quantum proxy signature without being detected. The forgery attacks may also cause some other serious security drawbacks for the quantum proxy signature. Second, the forgery under chosen-signature attack is introduced. We demonstrate that Qin et al.'s quantum multi-proxy signature cannot resist against the signature receiver's forgery under chosen-signature attack. The proposed proxy attacks and the forgery under chosen-signature attack can be used as the security analysis tools, which are useful for analyzing and improving the security of the quantum proxy signatures. At last, an improved quantum multi-proxy signature scheme was proposed. The improved scheme is secure against the original signer's proxy attack and the forgery under chosen-signature attack. Its security against the proxy signer's proxy attack depends on the credibility of the arbitrator.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] An efficient ID-based multi-proxy multi-signature scheme
    Guo, Sheng
    Cao, Zhenfu
    Lu, Rongxing
    FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
  • [22] Notes on proxy signcryption and multi-proxy signature schemes
    Pan, Chunhua
    Li, Shunpeng
    Zhu, Qihui
    Wang, Chunzhi
    Zhang, Mingwu
    International Journal of Network Security, 2015, 17 (01) : 29 - 33
  • [23] Multi-proxy quantum group signature scheme with threshold shared verification
    杨宇光
    Chinese Physics B, 2008, 17 (02) : 415 - 418
  • [24] Multi-proxy quantum group signature scheme with threshold shared verification
    Yu-Guang, Yang
    CHINESE PHYSICS B, 2008, 17 (02) : 415 - 418
  • [25] Multi-proxy signature and proxy multi-signature schemes from bilinear pairings
    Li, XX
    Chen, KF
    Li, SQ
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 591 - 595
  • [26] Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model
    Zhang, Jian-Hong
    Mao, Jian
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 1097 - 1112
  • [27] Efficient multi-proxy signature scheme with short length in the standard model
    Institute of Image Processing and Pattern Recognition, North China University of Technology, Beijing
    100144, China
    不详
    10083, China
    J. Inf. Sci. Eng., 4 (1097-1112):
  • [28] A Multi-proxy Multi-signature Scheme with Different Proxy Groups
    Liu, Danni
    Wang, Lijuan
    Wu, Dongdong
    Wei, Honglei
    2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 1414 - 1418
  • [29] New multi-proxy multi-signature schemes
    Hwang, SJ
    Chen, CC
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 147 (01) : 57 - 67
  • [30] An Ordered Multi-Proxy Multi-Signature Scheme
    Hwang, Min-Shiang
    Tzeng, Shiang-Feng
    Chiou, Shu-Fen
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS, 2008, : 308 - +