Cryptanalysis and Improvement of Some Quantum Proxy Blind Signature Schemes

被引:0
|
作者
Long Zhang
Shuang Li
Ke-Jia Zhang
Hong-Wei Sun
机构
[1] Heilongjiang University,School of Mathematical Science
[2] Heilongjiang Provincial Key Laboratory of the Theory and Computation of Complex Systems,State Key Laboratory of Networking and Switching Technology
[3] Beijing University of Posts and Telecommunications,School of Computer Science and Technology
[4] Harbin Engineering University,undefined
关键词
Quantum signatures; Proxy blind signature; Security loopholes; Improvements;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, two novel quantum proxy blind signature schemes are proposed by Zeng et al. and Yang et al., respectively. Their schemes have made a great contribution to the development of quantum proxy blind signature (QPBS). However, we find that there exist some security loopholes which have been neglected by them, i.e., the receiver can forge the signature in Zeng et al.’s scheme and the unreasonable assumption about arbitrator exists in Yang et al.’s scheme, etc. In order to overcome these problems, some improved ideas are proposed. Moreover, we give the further discussions of QPBS in this paper. Finally, we summarize some reasonable assumptions in order to satisfy the security properties of QPBS.
引用
收藏
页码:1047 / 1059
页数:12
相关论文
共 50 条
  • [41] Cryptanalysis and Improvement of Three Certificateless Aggregate Signature Schemes
    Yang, Xiaodong
    Li, Yutong
    Chen, Chunlin
    Xiao, Likun
    Wang, Caifen
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2018, 2018
  • [42] Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
    Xiao-Qiu Cai
    Chun-Yan Wei
    [J]. Quantum Information Processing, 2013, 12 : 1651 - 1657
  • [43] Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
    Cai, Xiao-Qiu
    Wei, Chun-Yan
    [J]. QUANTUM INFORMATION PROCESSING, 2013, 12 (04) : 1651 - 1657
  • [44] Cryptanalysis of two pairing-based blind signature schemes
    Wang, Jiyao
    Cao, Tianjie
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 180 - +
  • [45] Cryptanalysis of some certificateless signature schemes in the standard model
    Wu, Chenhuang
    Lin, Weidi
    Huang, Hui
    Chen, Zhixiong
    [J]. INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 36 (06): : 16 - 25
  • [46] A Novel Quantum Proxy Blind Signature Scheme
    Guo, Wei
    Xie, Shu-Cui
    Zhang, Jian-Zhong
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (05) : 1708 - 1718
  • [47] Batch proxy quantum blind signature scheme
    Shi JinJing
    Shi RongHua
    Guo Ying
    Peng XiaoQi
    Tang Ying
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 9
  • [48] Cryptanalysis of a sessional blind signature based on quantum cryptography
    Su, Qi
    Li, Wen-Min
    [J]. QUANTUM INFORMATION PROCESSING, 2014, 13 (09) : 1917 - 1929
  • [49] A Quantum Proxy Weak Blind Signature Scheme
    Cao, Hai-Jing
    Zhu, Yan-Yan
    Li, Peng-Fei
    [J]. INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2014, 53 (02) : 419 - 425
  • [50] Batch proxy quantum blind signature scheme
    SHI JinJing
    SHI RongHua
    GUO Ying
    PENG XiaoQi
    TANG Ying
    [J]. Science China(Information Sciences), 2013, 56 (05) : 202 - 210