A Weak Quantum Blind Signature with Entanglement Permutation

Motivated by the permutation encryption algorithm, a weak quantum blind signature (QBS) scheme is proposed. It involves three participants, including the sender Alice, the signatory Bob and the trusted entity Charlie, in four phases, i.e., initializing phase, blinding phase, signing phase and verifying phase. In a small-scale quantum computation network, Alice blinds the message based on a quantum entanglement permutation encryption algorithm that embraces the chaotic position string. Bob signs the blinded message with private parameters shared beforehand while Charlie verifies the signature’s validity and recovers the original message. Analysis shows that the proposed scheme achieves the secure blindness for the signer and traceability for the message owner with the aid of the authentic arbitrator who plays a crucial role when a dispute arises. In addition, the signature can neither be forged nor disavowed by the malicious attackers. It has a wide application to E-voting and E-payment system, etc.

[1]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[2]  Charles H. Bennett,et al.  Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.

[3]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[4]  I. Chuang,et al.  Quantum Computation and Quantum Information: Introduction to the Tenth Anniversary Edition , 2010 .

[5]  L. Kocarev,et al.  Chaos and cryptography: block encryption ciphers based on chaotic maps , 2001 .

[6]  Hans Halvorson,et al.  Entanglement and Open Systems in Algebraic Quantum Field Theory , 2001 .

[7]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[8]  Dimitris Gritzalis,et al.  Secure Electronic Voting , 2003, Advances in Information Security.

[9]  Ping Zhou,et al.  Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .

[10]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[11]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[12]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[13]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[14]  Yuan Tian,et al.  A weak blind signature scheme based on quantum cryptography , 2009 .

[15]  Wang Tian-yin,et al.  Fair quantum blind signatures , 2010 .

[16]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[17]  Aggelos Kiayias,et al.  BiTR: Built-in Tamper Resilience , 2011, IACR Cryptol. ePrint Arch..

[18]  Qing Liu,et al.  An Improved Image Encryption Method Based on Total Shuffling Scheme , 2011 .

[19]  P. J. Clarke,et al.  Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light , 2012, Nature communications.

[20]  Yang Wei,et al.  Cryptanalysis of fair quantum blind signatures , 2012 .

[21]  Xunru Yin,et al.  A Blind Quantum Signature Scheme with χ-type Entangled States , 2012 .

[22]  Huijuan Zuo Cryptanalysis of Quantum Blind Signature Scheme , 2013 .

[23]  Ye Liu,et al.  Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication , 2013 .

[24]  Lihua Gong,et al.  Three-party remote state preparation schemes based on entanglement , 2014, Quantum Inf. Process..

[25]  Li-Hua Gong,et al.  A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .

[26]  Ying Guo,et al.  A Chaos-based Arbitrated Quantum Signature Scheme in Quantum Crypotosystem , 2014 .