An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

In this paper, a new quantum encryption based on the key-controlled chained CNOT operations, which is named KCCC encryption, is proposed. With the KCCC encryption, an improved arbitrated quantum signature (AQS) protocol is presented. Compared with the existing protocols, our protocol can effectively prevent forgery attacks and disavowal attacks. Moreover, only single state is required in the protocol. We hope it is helpful to further research in the design of AQS protocols in future.

[1]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[2]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[3]  Ahmed A. Abd El-Latif,et al.  A dynamic watermarking scheme for quantum images using quantum wavelet transform , 2013, Quantum Information Processing.

[4]  Fei Gao,et al.  Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols , 2010, IEEE Journal of Quantum Electronics.

[5]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[6]  R. Cleve,et al.  HOW TO SHARE A QUANTUM SECRET , 1999, quant-ph/9901025.

[7]  Yuan Su,et al.  Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state , 2012, Physica Scripta.

[8]  V. Buzek,et al.  Quantum secret sharing , 1998, quant-ph/9806063.

[9]  Tzonelih Hwang,et al.  Comment on “Security analysis and improvements of arbitrated quantum signature schemes” , 2011, 1105.1232.

[10]  Ying Sun,et al.  Reexamination of arbitrated quantum signature: the impossible and the possible , 2013, Quantum Inf. Process..

[11]  Qiaoyan Wen,et al.  Quantum secure direct communication with χ -type entangled states , 2008 .

[12]  Qiaoyan Wen,et al.  Quantum Steganography with High Efficiency with Noisy Depolarizing Channels , 2013, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[13]  Charles H. Bennett,et al.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. , 1993, Physical review letters.

[14]  Su-Juan Qin,et al.  Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state , 2010 .

[15]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[16]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[17]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[18]  Mosayeb Naseri,et al.  Quantum Watermarking Using Entanglement Swapping , 2012, International Journal of Theoretical Physics.

[19]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[20]  Wen Qiao-Yan,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011 .

[21]  Jian-Hong Shi,et al.  An arbitrated quantum signature protocol based on the chained CNOT operations encryption , 2015, Quantum Inf. Process..

[22]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[23]  Antoni Wojcik,et al.  Comment on 'Quantum dense key distribution' , 2005 .

[24]  Wei-Wei Zhang,et al.  Improving the security of arbitrated quantum signature against the forgery attack , 2013, Quantum Inf. Process..

[25]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[26]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[27]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[28]  Adan Cabello Quantum key distribution without alternative measurements , 2000 .

[29]  Qiaoyan Wen,et al.  Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174] , 2007 .

[30]  Qiaoyan Wen,et al.  Improving the security of multiparty quantum secret sharing against an attack with a fake signal , 2006 .

[31]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[32]  Fen-Zhuo Guo,et al.  Consistency of shared reference frames should be reexamined , 2008 .

[33]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[34]  Ying Guo,et al.  A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem , 2014 .

[35]  Fei Gao,et al.  A simple participant attack on the brádler-dušek protocol , 2007, Quantum Inf. Comput..

[36]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[37]  Qiao-Yan Wen,et al.  Comment on "experimental demonstration of a quantum protocol for Byzantine agreement and liar detection". , 2008, Physical review letters.

[38]  Kejia Zhang,et al.  Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme , 2015 .

[39]  Wen Qiao-Yan,et al.  Teleportation attack on the QSDC protocol with a random basis and order , 2008 .

[40]  Guang-Can Guo,et al.  Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)] , 2001 .

[41]  Peng Xu,et al.  Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform , 2013, Quantum Inf. Process..

[42]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[43]  Tzonelih Hwang,et al.  Comment on "An arbitrated quantum signature protocol based on the chained CNOT operations encryption" , 2015 .

[44]  Wen Qiao-Yan,et al.  A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol , 2008 .

[45]  Qiaoyan Wen,et al.  Quantum key distribution without alternative measurements and rotations , 2006 .

[46]  Gang Xu,et al.  CRYPTANALYSIS OF THE QUANTUM STATE SHARING PROTOCOL USING FOUR SETS OF W-CLASS STATES , 2013 .

[47]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[48]  Adan Cabello Reply to `Comment on ``Quantum key distribution without alternative measurements''' , 2000 .

[49]  Yixian Yang,et al.  Multi-party quantum secret sharing with the single-particle quantum state to encode the information , 2013, Quantum Inf. Process..

[50]  Shang Tao,et al.  Enhanced arbitrated quantum signature scheme using Bell states , 2014 .

[51]  Todd A. Brun,et al.  Quantum steganography , 2010, Digital Media Steganography.

[52]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[53]  Deng Fu-Guo,et al.  Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)] , 2006 .

[54]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[55]  Dowon Hong,et al.  Security problem on arbitrated quantum signature schemes , 2011 .

[56]  Xin Liao,et al.  Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels , 2015, J. Vis. Commun. Image Represent..