A blind quantum signature protocol using the GHZ states

Recently, some blind quantum signature (BQS) protocols have been proposed. But the previous schemes have security and efficiency problems. Based on the entangled Greenberger-Horne-Zeilinger (GHZ) states, a new weak BQS protocol is proposed. Compared with some existing schemes, our protocol has 100% efficiency. Besides, the protocol is simple and easy to implement. The security of the protocol is guaranteed by the correlation of the GHZ particles held by each participant. In our protocol, the signatory is kept blind from the content of the message. According to the security analysis, the signatory cannot disavowal his/her signature while the signature cannot be forged by others.

[1]  Yuan Tian,et al.  A weak blind signature scheme based on quantum cryptography , 2009 .

[2]  Gang Xu,et al.  CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH W STATE , 2008 .

[3]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[4]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[5]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[6]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[7]  Mosayeb Naseri A weak blind signature based on quantum cryptography , 2011 .

[8]  N. Gisin,et al.  Experimental demonstration of quantum secret sharing , 2001 .

[9]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[10]  N. Lutkenhaus,et al.  Comment on ``Arbitrated quantum-signature scheme'' , 2008, 0806.0854.

[11]  Guihua Zeng Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ” , 2008 .

[12]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[13]  Wen Qiao-Yan,et al.  Quantum blind signature based on Two-State Vector Formalism , 2010 .

[14]  Qiaoyan Wen,et al.  Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol , 2007, 0801.2418.

[15]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[16]  Jian-Wei Pan,et al.  Experimental quantum secret sharing and third-man quantum cryptography. , 2005, Physical review letters.

[17]  D. Gottesman Theory of quantum secret sharing , 1999, quant-ph/9910067.

[18]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .

[19]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[20]  Yixian Yang,et al.  Multi-party quantum secret sharing with the single-particle quantum state to encode the information , 2013, Quantum Inf. Process..

[21]  Xunru Yin,et al.  A Blind Quantum Signature Scheme with χ-type Entangled States , 2012 .

[22]  Hwayean Lee,et al.  Arbitrated quantum signature scheme with message recovery , 2004 .

[23]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[24]  Chun-Wei Yang,et al.  Enhancement on “quantum blind signature based on two-state vector formalism” , 2013, Quantum Inf. Process..

[25]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[26]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[27]  Liusheng Huang,et al.  Quantum group blind signature scheme without entanglement , 2011 .

[28]  Moti Yung,et al.  Distributing the power of a government to enhance the privacy of voters , 1986, PODC '86.

[29]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[30]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[31]  Zheng Zhou,et al.  Arbitrated quantum signature with an untrusted arbitrator , 2011 .

[32]  Tian-Yin Wang,et al.  CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION , 2008 .

[33]  Wen Qiao-Yan,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011 .

[34]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[35]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[36]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[37]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[38]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.