Comments on the "Efficient quantum multi-proxy signature"

被引:5
|
作者
Tan, Ruimei [1 ]
Yang, Qinglan [2 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Math & Informat Sci, Zhengzhou 450002, Peoples R China
[2] Zhengzhou Univ Light Ind, Lib, Zhengzhou 450002, Peoples R China
关键词
Quantum signature; Proxy signature; Proxy attack; Chosen-signature attack; SCHEME;
D O I
10.1007/s11128-020-02783-6
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency. Unfortunately, it is not secure against proxy attacks and forgery attack. In this paper, first, the proxy attacks for the quantum proxy signature scheme are introduced. We demonstrate that every proxy signer can delegate the proxy signing power to a malicious arbitrator, who can sign any message on behalf of all the proxy signers. At the same time, the original signer can also impersonate the proxy signer to generate a quantum proxy signature without being detected. The forgery attacks may also cause some other serious security drawbacks for the quantum proxy signature. Second, the forgery under chosen-signature attack is introduced. We demonstrate that Qin et al.'s quantum multi-proxy signature cannot resist against the signature receiver's forgery under chosen-signature attack. The proposed proxy attacks and the forgery under chosen-signature attack can be used as the security analysis tools, which are useful for analyzing and improving the security of the quantum proxy signatures. At last, an improved quantum multi-proxy signature scheme was proposed. The improved scheme is secure against the original signer's proxy attack and the forgery under chosen-signature attack. Its security against the proxy signer's proxy attack depends on the credibility of the arbitrator.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] A new threshold multi-proxy multi-signature scheme
    Baoyuan Kang Jingguang Han Qinju Wang (College of mathematics science and computing technology
    Central South University)
    信息安全与通信保密, 2005, (07) : 133 - 137
  • [42] Insider attacks on multi-proxy multi-signature schemes
    Guo, Lifeng
    Wang, Guilin
    COMPUTERS & ELECTRICAL ENGINEERING, 2007, 33 (02) : 88 - 93
  • [43] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju (College of Mathematic Science and Computing Technology
    Journal of Electronics(China), 2006, (04) : 560 - 563
  • [44] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Kang Baoyuan Han Jingguang Wang Qinju College of Mathematic Science and Computing Technology Central South University Changsha China
    JournalofElectronics, 2006, (04) : 560 - 563
  • [45] Multi-proxy multi-signature binding positioning protocol
    Xue, Qingshui
    Li, Fengying
    Chen, Huafeng
    Zhang, Huajun
    Cao, Zhenfu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3868 - 3879
  • [46] A Practical E-Payment Protocol Based on Quantum Multi-Proxy Blind Signature
    Niu, Xu-Feng
    Zhang, Jian-Zhong
    Xie, Shu-Cui
    Chen, Bu-Qing
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2018, 70 (05) : 529 - 533
  • [47] A Practical E-Payment Protocol Based on Quantum Multi-Proxy Blind Signature
    牛旭峰
    张建中
    谢淑翠
    陈步青
    Communications in Theoretical Physics, 2018, 70 (11) : 529 - 533
  • [48] Formalized security model of multi-proxy signature schemes
    Wang, Q
    Cao, ZF
    Wang, SB
    Fifth International Conference on Computer and Information Technology - Proceedings, 2005, : 668 - 672
  • [49] Message recovery via an efficient multi-proxy signature with self-certified keys
    Chande M.K.
    Lee C.-C.
    Li C.-T.
    International Journal of Network Security, 2017, 19 (03) : 340 - 346
  • [50] A Nominative Multi-Proxy Signature Scheme Based on ECC
    MA Chuan-gui
    Wuhan University Journal of Natural Sciences, 2005, (01) : 223 - 226