Security analysis and improvement of a quantum multi-signature protocol

被引:0
|
作者
Qianqian He
Xiangjun Xin
Qinglan Yang
机构
[1] Zhengzhou University of Light Industry,School of Mathematics and Information Science
[2] Zhengzhou University of Light Industry,College of Software Engineering
[3] Library,undefined
[4] Zhengzhou University of Light Industry,undefined
来源
关键词
Quantum multi-signature; Product state; Forgery attack; Undeniability;
D O I
暂无
中图分类号
学科分类号
摘要
Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately, their protocol cannot resist against the forgery attack and disavowal attack. We investigate the security of Jiang et al.’s quantum multi-signature protocol and demonstrate the signature receiver’s forgery attack. What is more, the signature receiver can extend the forgery attack such that anyone can generate the forgery. On the other hand, their protocol is insecure against the signers’ disavowal attack, too. Then, an improved quantum multi-signature protocol is proposed. In the improved protocol, all the signers share the private keys with the signature receiver and the arbitrator. To generate a quantum multi-signature, all the signers perform the unitary operations controlled by the private keys and the message. The improved protocol overcomes all the security drawbacks of Jiang et al.’s quantum multi-signature. What is more, the arbitrator Trent can be semi-trusted, because he cannot forge any quantum signature of the signers, although Trent shares the private keys with all the signers. At the same time, the new protocol has the same quantum efficiency as that of Jiang et al.’s protocol.
引用
收藏
相关论文
共 50 条
  • [41] A CDH-Based Multi-signature Scheme with Tight Security Reduction
    Wang, Zecheng
    Si, Taozhi
    Qian, Haifeng
    Li, Zhibin
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2096 - +
  • [42] The design of Multi-Signature Certification Algorithm protocol in Emergency Response System
    Peng Xu-fu
    Ding Yi
    Huang Xuan
    Wen Fu-rong
    2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 95 - 98
  • [43] The Design of multi-signature certification algorithm protocol in emergency response system
    Peng X.-F.
    Ding Y.
    Huang X.
    Journal of Networks, 2010, 5 (07) : 864 - 866
  • [44] Cryptographic analysis of the two structured multi-signature schemes
    Zhang, Jun
    Journal of Computational Information Systems, 2010, 6 (09): : 3127 - 3135
  • [45] Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme
    Kar, Jayaprakash
    NETWORK AND SYSTEM SECURITY, 2017, 10394 : 291 - 300
  • [46] A Combination Multi-Signature Scheme
    Jun, Zhang
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 2, PROCEEDINGS, 2009, : 16 - 19
  • [47] Certificateless proxy multi-signature
    Du, Hongzhen
    Wen, Qiaoyan
    INFORMATION SCIENCES, 2014, 276 : 21 - 30
  • [48] An Efficient Post-quantum Multi-signature Scheme for the Internet of Vehicles
    Zhang, Qianyi
    Yuan, Shuai
    Guan, Zhitao
    Du, Xiaojiang
    Guizani, Mohsen
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 2504 - 2509
  • [49] Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
    Lyuu, YD
    Wu, ML
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 729 - 739
  • [50] The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes
    Zhang, Long
    Zhang, Hai-Yan
    Zhang, Ke-Jia
    Wang, Qing-Le
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2017, 56 (06) : 1983 - 1994