Security analysis and improvement of a quantum multi-signature protocol

被引:0
|
作者
Qianqian He
Xiangjun Xin
Qinglan Yang
机构
[1] Zhengzhou University of Light Industry,School of Mathematics and Information Science
[2] Zhengzhou University of Light Industry,College of Software Engineering
[3] Library,undefined
[4] Zhengzhou University of Light Industry,undefined
来源
关键词
Quantum multi-signature; Product state; Forgery attack; Undeniability;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately, their protocol cannot resist against the forgery attack and disavowal attack. We investigate the security of Jiang et al.’s quantum multi-signature protocol and demonstrate the signature receiver’s forgery attack. What is more, the signature receiver can extend the forgery attack such that anyone can generate the forgery. On the other hand, their protocol is insecure against the signers’ disavowal attack, too. Then, an improved quantum multi-signature protocol is proposed. In the improved protocol, all the signers share the private keys with the signature receiver and the arbitrator. To generate a quantum multi-signature, all the signers perform the unitary operations controlled by the private keys and the message. The improved protocol overcomes all the security drawbacks of Jiang et al.’s quantum multi-signature. What is more, the arbitrator Trent can be semi-trusted, because he cannot forge any quantum signature of the signers, although Trent shares the private keys with all the signers. At the same time, the new protocol has the same quantum efficiency as that of Jiang et al.’s protocol.
引用
收藏
相关论文
共 50 条
  • [1] Security analysis and improvement of a quantum multi-signature protocol
    He, Qianqian
    Xin, Xiangjun
    Yang, Qinglan
    QUANTUM INFORMATION PROCESSING, 2021, 20 (01)
  • [2] Security analysis of quantum multi-signature protocol based on teleportation
    Zuo, Huijuan
    Zhang, Kejia
    Song, Tingting
    QUANTUM INFORMATION PROCESSING, 2013, 12 (07) : 2343 - 2353
  • [3] Security analysis of quantum multi-signature protocol based on teleportation
    Huijuan Zuo
    Kejia Zhang
    Tingting Song
    Quantum Information Processing, 2013, 12 : 2343 - 2353
  • [4] Security Analysis and The Improvement of Multi-Proxy Multi-signature Scheme
    Zhang, Xinghua
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 1680 - 1683
  • [5] Quantum multi-signature protocol based on teleportation
    Wen, Xiao-Jun
    Liu, Yun
    Sun, Yu
    ZEITSCHRIFT FUR NATURFORSCHUNG SECTION A-A JOURNAL OF PHYSICAL SCIENCES, 2007, 62 (3-4): : 147 - 151
  • [6] Security analysis and improvement of digital multi-signature on the generalized conic curve
    Ding, Li
    Zhou, Yuan
    Qian, Hai-Feng
    Beijing Gongye Daxue Xuebao/Journal of Beijing University of Technology, 2010, 36 (05): : 646 - 650
  • [7] SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME
    Lu Rongbo He Dake Wang Changji(College of Mathematics and Computer Science
    Journal of Electronics(China), 2008, (03) : 372 - 377
  • [8] Quantum multi-signature protocol based on Bell state
    Zi-Ye Chen
    Ming Chang
    Ling Fan
    Cong Cao
    Ru Zhang
    Optical and Quantum Electronics, 56
  • [9] Quantum multi-signature protocol based on Bell state
    Chen, Zi-Ye
    Chang, Ming
    Fan, Ling
    Cao, Cong
    Zhang, Ru
    OPTICAL AND QUANTUM ELECTRONICS, 2024, 56 (05)
  • [10] Security Analysis and The Improvement of the sequential multi-signature scheme based on discrete logarithm
    Zhang, Xinghua
    2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 581 - 584