Security analysis and improvement of an arbitrated quantum signature scheme

Abstract We analyze the security of Jiang et al.’s arbitrated quantum signature scheme based on local indistinguishability of orthogonal product states. First, Jiang et al.’s scheme cannot resist against the forgery attack. Second, it is insecure against disavowal attack. Then, an improved arbitrated quantum signature scheme is proposed. The new scheme overcomes the security drawbacks of Jiang et al.’s scheme and it is secure against forgery attack and disavowal attack. What is more, it is more efficient than the old scheme. On the other hand, our quantum signature scheme is based on product states, which can be obtained straightforwardly, thus our scheme is easier to implement than the schemes using cluster states.

[1]  Wei-Wei Zhang,et al.  Improving the security of arbitrated quantum signature against the forgery attack , 2013, Quantum Inf. Process..

[2]  Chunhui Wu,et al.  On the Existence of Quantum Signature for Quantum Messages , 2013, 1302.4528.

[3]  Gang Xu,et al.  Cryptanalysis of secret sharing with a single d-level quantum system , 2018, Quantum Inf. Process..

[4]  Fang Yu,et al.  Security Problems in the Quantum Signature Scheme with a Weak Arbitrator , 2014 .

[5]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[6]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[7]  Guang-Bao Xu,et al.  Arbitrary Quantum Signature Based on Local Indistinguishability of Orthogonal Product States , 2019, International Journal of Theoretical Physics.

[8]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[9]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[10]  Tian-Yin Wang,et al.  Cryptanalysis and improvement of a multi-user quantum key distribution protocol , 2010 .

[11]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[12]  A Cabello Quantum key distribution in the Holevo limit. , 2000, Physical review letters.

[13]  Qi Su,et al.  Improved Quantum Signature Scheme with Weak Arbitrator , 2013 .

[14]  Yu-Guang Yang,et al.  Arbitrated quantum signature scheme based on cluster states , 2016, Quantum Inf. Process..

[15]  Jongin Lim,et al.  Comment on “Quantum Signature Scheme with Weak Arbitrator” , 2014 .

[16]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[17]  Ying Sun,et al.  Reexamination of arbitrated quantum signature: the impossible and the possible , 2013, Quantum Inf. Process..

[18]  YeFeng He,et al.  Quantum key agreement protocols with four-qubit cluster states , 2015, Quantum Inf. Process..

[19]  Wen Qiao-Yan,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011 .

[20]  Jun Yu Li,et al.  Quantum key distribution scheme with orthogonal product states , 2001, quant-ph/0102060.

[21]  Ke-Jia Zhang,et al.  Security Weaknesses in Arbitrated Quantum Signature Protocols , 2014 .

[22]  Weizhong Zhao,et al.  On the security of arbitrated quantum signature schemes , 2012, 1205.3265.

[23]  Li-Hua Gong,et al.  High-Efficient Arbitrated Quantum Signature Scheme Based on Cluster States , 2017 .

[24]  Pedro J. Salas,et al.  Security of plug-and-play QKD arrangements with finite resources , 2013, Quantum Inf. Comput..

[25]  Qing-yu Cai,et al.  Photon-number-resolving decoy-state quantum key distribution , 2006 .

[26]  M. Luo,et al.  Quantum Signature Scheme with Weak Arbitrator , 2012 .