Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information

被引:0
|
作者
Xiangjun Xin
Qinglan Yang
Fagen Li
机构
[1] Zhengzhou University of Light Industry,School of Mathematics and Information Science
[2] Library,School of Computer Science and Engineering
[3] Zhengzhou University of Light Industry,undefined
[4] University of Electronic Science and Technology of China,undefined
来源
关键词
Quantum signature; Public key; Trapdoor; Kerckhoffs’s principle;
D O I
暂无
中图分类号
学科分类号
摘要
Based on the quantum asymmetric encryption with trapdoor information, a quantum public-key signature scheme is proposed. In our scheme, the signer signs a message with his/her private key, while the verifier verifies the quantum signature with the corresponding quantum public key. The signer’s private key and public key are asymmetric, and the signing algorithm and verifying algorithm are asymmetric as well. The security of the private key depends on the unconditionally secure deterministic quantum communication protocol rather than the classical one-way function. All the algorithms in our scheme are public. Hence, our scheme obeys Kerckhoffs’s principle. Our scheme is secure against forgery, repudiation, and eavesdropping attacks. On the other hand, in our scheme, the verifier need not perform any quantum swap test. The signer’s key pair can be reused due to the secrecy property of the private key. Compared with similar schemes, ours is relatively more secure and efficient.
引用
收藏
相关论文
共 50 条
  • [1] Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information
    Xin, Xiangjun
    Yang, Qinglan
    Li, Fagen
    [J]. QUANTUM INFORMATION PROCESSING, 2020, 19 (08)
  • [2] Public-key encryption and authentication of quantum information
    Liang Min
    Yang Li
    [J]. SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2012, 55 (09) : 1618 - 1629
  • [3] Public-key encryption and authentication of quantum information
    LIANG Min 1
    2 Graduate University of Chinese Academy of Sciences
    [J]. Science China(Physics,Mechanics & Astronomy), 2012, (09) : 1618 - 1629
  • [4] Public-key encryption and authentication of quantum information
    Min Liang
    Li Yang
    [J]. Science China Physics, Mechanics and Astronomy, 2012, 55 : 1618 - 1629
  • [5] Efficient identity-based public-key quantum signature scheme
    Xin, Xiangjun
    Wang, Zhuo
    Yang, Qinglan
    Li, Fagen
    [J]. INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2020, 34 (10):
  • [6] Public-Key Encryption with Quantum Keys
    Barooti, Khashayar
    Grilo, Alex B.
    Hugucnin-Dumittan, Lois
    Malavolta, Giulio
    Sattath, Or
    Vu, Quoc-Huy
    Walter, Michael
    [J]. THEORY OF CRYPTOGRAPHY, TCC 2023, PT IV, 2023, 14372 : 198 - 227
  • [7] Bit-oriented quantum public-key encryption based on quantum perfect encryption
    Chenmiao Wu
    Li Yang
    [J]. Quantum Information Processing, 2016, 15 : 3285 - 3300
  • [8] Bit-oriented quantum public-key encryption based on quantum perfect encryption
    Wu, Chenmiao
    Yang, Li
    [J]. QUANTUM INFORMATION PROCESSING, 2016, 15 (08) : 3285 - 3300
  • [9] Trapdoor security in a searchable public-key encryption scheme with a designated tester
    Rhee, Hyun Sook
    Park, Jong Hwan
    Susilo, Willy
    Lee, Dong Hoon
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (05) : 763 - 771
  • [10] Combining Public-Key Encryption with Digital Signature Scheme
    Alia, Mohammad Ahmad
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 : 870 - 878