Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party

被引:0
|
作者
Ling Zhang
Jia-Hao Zhang
Xiang-Jun Xin
Chao-Yang Li
Min Huang
机构
[1] Zhengzhou University of Light Industry,
关键词
Signature scheme; Quantum signature; Designated verifier; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding using DVS attributes to protect the secret of participants. Most traditional DVS schemes are vulnerable to quantum computer attacks. Then, an identity-based semi-trusted third-party quantum DVS (STQDVS) scheme is proposed, which is safe for quantum means of attack. In the new STQDVS scheme, the third participant prepares entangled Bell states and allocates them to the signer and the designated verifier (DV). The signer uses the identity information as her public key and the measurement results of corresponding quantum sequences as her private key to generate the signature. The DV applies the identity information as his public key and the measurement results of corresponding quantum sequences as her private key to verify the signature. Non-transferability and hidden origin are guaranteed by the fact that the DV can generate the same signature as the signatory by means of a simulated signature step. Security analysis has shown that attacks such as forgery, inter-resending, and impersonation are ineffective for the proposed scheme and that even third-party cannot forge signatures. On the other hand, the whole process of the scheme does not require any quantum key distribution protocols, quantum one-way functions, and quantum state exchange tests, which makes the STQDVS scheme relatively simple and more efficient than similar schemes.
引用
收藏
相关论文
共 50 条
  • [31] Certificateless Strong Designated Verifier Signature Scheme
    Xiao, Zibi
    Yang, Bo
    Li, Shougui
    2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 232 - 236
  • [32] An efficient strong designated verifier signature scheme
    Saeednia, S
    Kremer, S
    Markowitch, O
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 40 - 54
  • [33] Attacks on a Universal Designated Verifier Signature Scheme
    Li Yanping
    Pang Liaojun
    Wang Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 27 - +
  • [34] An improved strong designated verifier signature scheme
    Li, Chao
    Zhang, SongSong
    Zhang, Yilai
    Xie, Yong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2018, 14 (12):
  • [35] A New Strong Designated Verifier Signature Scheme
    Shapuan, N.
    Ismail, E. S.
    2017 UKM FST POSTGRADUATE COLLOQUIUM, 2018, 1940
  • [36] Pairings Based Designated Verifier Signature Scheme for Three-Party Communication Environment
    Lin, Han-Yu
    Wu, Tzong-Sun
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL I, PROCEEDINGS, 2009, : 330 - +
  • [37] Best-practice example from Australia: privacy-preserving approach using semi-trusted third-party models
    Churches, Tim
    EUROPEAN JOURNAL OF PUBLIC HEALTH, 2010, 20 : 102 - 102
  • [38] Fair multi-party exchange protocol with the off-line semi-trusted third party
    Li, Yan-Ping
    Zhang, Jian-Zhong
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2004, 31 (05): : 811 - 814
  • [39] A practical quantum designated verifier signature scheme for E-voting applications
    Mengce Zheng
    Kaiping Xue
    Shangbin Li
    Nenghai Yu
    Quantum Information Processing, 2021, 20
  • [40] Quantum Designated Multi- verifier Signature
    Zhang, Ling
    Zhang, Jia-Hao
    Xin, Xiang-Jun
    Huang, Min
    Li, Chao-Yang
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2024, 63 (01)