Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack

被引:8
|
作者
Zhou, Bao-Min [1 ]
Lin, Lian-Dong [1 ,2 ]
Wang, Wei [1 ]
Liu, Ying [3 ]
机构
[1] Heilongjiang Univ, Sch Math Sci, Harbin 150080, Heilongjiang, Peoples R China
[2] Heilongjiang Univ, Dept Elect & Engineer, Harbin 150080, Heilongjiang, Peoples R China
[3] Heilongjiang Inst Construct Technol, Sch Dept Munnicipal & Environm Engn, Harbin 150025, Heilongjiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum proxy blind signature; Security loopholes; Forgery attack; Forge signature; PROTOCOL; SCHEME;
D O I
10.1007/s10773-019-04340-z
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
As an important topic of quantum cryptography, quantum proxy blind signature has attracted more and more attentions in recent years. However, with our analysis, it can be seen that there exists a common security loophole in two particular quantum proxy blind signature schemes, i.e., the receiver can forge a valid signature without being caught by others. In order to show that, the detailed attack strategy and the potential improved ideas are proposed in this paper.
引用
收藏
页码:465 / 473
页数:9
相关论文
共 50 条
  • [1] Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack
    Bao-Min Zhou
    Lian-Dong Lin
    Wei Wang
    Ying Liu
    [J]. International Journal of Theoretical Physics, 2020, 59 : 465 - 473
  • [2] Improving the security of arbitrated quantum signature against the forgery attack
    Zhang, Ke-Jia
    Zhang, Wei-Wei
    Li, Dan
    [J]. QUANTUM INFORMATION PROCESSING, 2013, 12 (08) : 2655 - 2669
  • [3] Improving the security of arbitrated quantum signature against the forgery attack
    Ke-Jia Zhang
    Wei-Wei Zhang
    Dan Li
    [J]. Quantum Information Processing, 2013, 12 : 2655 - 2669
  • [4] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
    Wang, Tian-Yin
    Wei, Zong-Li
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2016, 55 (02) : 743 - 745
  • [5] Analysis of Forgery Attack on One-Time Proxy Signature and the Improvement
    Tian-Yin Wang
    Zong-Li Wei
    [J]. International Journal of Theoretical Physics, 2016, 55 : 743 - 745
  • [6] Attack and improvement of a proxy blind signature
    Ren, De-Bin
    Hu, Yong
    Fang, Yong
    [J]. Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2007, 39 (06): : 119 - 122
  • [7] Forgery attack on one-time proxy signature and the improvement
    Yang, Chun-Wei
    Luo, Yi-Ping
    Hwang, Tzonelih
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 2007 - 2016
  • [8] Forgery attack on one-time proxy signature and the improvement
    Chun-Wei Yang
    Yi-Ping Luo
    Tzonelih Hwang
    [J]. Quantum Information Processing, 2014, 13 : 2007 - 2016
  • [9] Security of proxy blind signature scheme
    Zhang, Jianhong
    Cui, Yuanbo
    Chen, Zhipeng
    [J]. Information Technology Journal, 2013, 12 (03) : 466 - 469
  • [10] Analysis and improvement of proxy-protected signature secure against the undelegated proxy signature attack
    Hu, Xiaoming
    Xu, Huajie
    Si, Taozhi
    [J]. Journal of Computational Information Systems, 2010, 6 (09): : 2997 - 3002