Blind Quantum Signature with Blind Quantum Computation

Blind quantum computation allows a client without quantum abilities to interact with a quantum server to perform a unconditional secure computing protocol, while protecting client’s privacy. Motivated by confidentiality of blind quantum computation, a blind quantum signature scheme is designed with laconic structure. Different from the traditional signature schemes, the signing and verifying operations are performed through measurement-based quantum computation. Inputs of blind quantum computation are securely controlled with multi-qubit entangled states. The unique signature of the transmitted message is generated by the signer without leaking information in imperfect channels. Whereas, the receiver can verify the validity of the signature using the quantum matching algorithm. The security is guaranteed by entanglement of quantum system for blind quantum computation. It provides a potential practical application for e-commerce in the cloud computing and first-generation quantum computation.

[1]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[2]  Ying Guo,et al.  A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem , 2014 .

[3]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[4]  Tian-Yin Wang,et al.  Security of a sessional blind signature based on quantum cryptograph , 2014, Quantum Information Processing.

[5]  T. Morimae Verification for measurement-only blind quantum computing , 2012, 1208.1495.

[6]  Andrew M. Childs Secure assisted quantum computation , 2001, Quantum Inf. Comput..

[7]  Joseph Fitzsimons,et al.  Optimal Blind Quantum Computation , 2013, Physical review letters.

[8]  T. Morimae,et al.  Blind quantum computation protocol in which Alice only makes measurements , 2012, 1201.3966.

[9]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[10]  Philip Walther,et al.  Demonstration of measurement-only blind quantum computing , 2016, 1601.02451.

[11]  Elham Kashefi,et al.  Universal Blind Quantum Computation , 2008, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[12]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[13]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[14]  Elham Kashefi,et al.  Demonstration of Blind Quantum Computing , 2011, Science.

[15]  Louis Salvail,et al.  BLIND QUANTUM COMPUTATION , 2003 .

[16]  Qin Li,et al.  Triple-server blind quantum computation using entanglement swapping , 2014 .

[17]  Keisuke Fujii,et al.  Blind quantum computation over a collective-noise channel , 2016 .

[18]  Moon Ho Lee,et al.  CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM , 2007 .

[19]  Ying Guo,et al.  High-efficient quantum secret sharing based on the Chinese remainder theorem via the orbital angular momentum entanglement analysis , 2012, Quantum Information Processing.

[20]  Ali Zakerolhosseini,et al.  A sessional blind signature based on quantum cryptography , 2014, Quantum Inf. Process..

[21]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[22]  Mulan Liu,et al.  Classification of signature-only signature models , 2008, Science in China Series F: Information Sciences.

[23]  Keisuke Fujii,et al.  Blind topological measurement-based quantum computation , 2011, Nature Communications.