Unconditionally Secure Quantum Signatures

被引:39
|
作者
Amiri, Ryan [1 ]
Andersson, Erika [1 ]
机构
[1] Heriot Watt Univ, Sch Engn & Phys Sci, Inst Photon & Quantum Sci, SUPA, Edinburgh EH14 4AS, Midlothian, Scotland
来源
ENTROPY | 2015年 / 17卷 / 08期
基金
英国工程与自然科学研究理事会;
关键词
DIGITAL-SIGNATURES; COHERENT STATES; AUTHENTICATION;
D O I
10.3390/e17085635
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols-signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA)-are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally securesecure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.
引用
收藏
页码:5635 / 5659
页数:25
相关论文
共 50 条
  • [21] Secure quantum signatures using insecure quantum channels
    Amiri, Ryan
    Wallden, Petros
    Kent, Adrian
    Andersson, Erika
    [J]. PHYSICAL REVIEW A, 2016, 93 (03)
  • [22] Unconditionally secure quantum key distribution with relatively strong signal pulse
    Tamaki, Kiyoshi
    [J]. PHYSICAL REVIEW A, 2008, 77 (03):
  • [23] Unconditionally Secure Quantum Bit Commitment Protocol Based on Incomplete Information
    Nagy, Naya
    Nagy, Marius
    [J]. THEORY AND PRACTICE OF NATURAL COMPUTING (TPNC 2014), 2014, 8890 : 134 - 143
  • [24] Unconditionally Secure Quantum Communications via Decoherence-Free Subspaces
    Guedes, E. B.
    de Assis, F. M.
    [J]. IEEE LATIN AMERICA TRANSACTIONS, 2015, 13 (06) : 2017 - 2026
  • [25] Secure and practical multiparty quantum digital signatures
    Weng, Chen-Xun
    Lu, Yu-Shuo
    Gao, Rui-Qi
    Xie, Yuan-Mei
    Gu, Jie
    Li, Chen-Long
    Li, Bing-Hong
    Yin, Hua-Lei
    Chen, Zeng-Bing
    [J]. OPTICS EXPRESS, 2021, 29 (17): : 27661 - 27673
  • [26] Unconditionally Secure Group Authentication
    Van Dijk M.
    Gehrmann C.
    Smeets B.
    [J]. Designs, Codes and Cryptography, 1998, 14 (3) : 281 - 296
  • [27] Unconditionally Secure Electronic Voting
    Otsuka, Akira
    Imai, Hideki
    [J]. TOWARDS TRUSTWORTHY ELECTIONS: NEW DIRECTIONS IN ELECTRONIC VOTING, 2010, 6000 : 107 - 123
  • [28] Unconditionally secure entity authentication
    Kurosawa, K
    [J]. 1998 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 1998, : 298 - 298
  • [29] Multiround Unconditionally Secure Authentication
    Gehrmann C.
    [J]. Designs, Codes and Cryptography, 1998, 15 (1) : 67 - 86
  • [30] Unconditionally Secure Searchable Encryption
    Yoshizawa, Takahiro
    Watanabe, Yohei
    Shikata, Junji
    [J]. 2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2017,