Comment on “Security analysis and improvements of arbitrated quantum signature schemes”

Recently, Zou, and Qiu [Phys. Rev. A 82, 042325 (2010)] demonstrated that two arbitrated quantum signature (AQS) schemes are not secure because an arbitrator cannot arbitrate the dispute between two users when a receiver repudiates the integrity of a signature. By using a public board, Zou and Qiu's proposed two AQS schemes to solve the problem. This work shows that the same security problem may exist in Zou and Qiu's schemes. Moreover, a malicious verifier, Bob, can actively negate a signed order if he wants to. This attack, a special case of the denial-of-service (DoS) attack mentioned by Cai [Phys. Rev. Lett. 91, 109801 (2003)], is important in quantum cryptography. Bob may get some benefits from this DoS attack since he can actively deny Alice's signed order without being detected. This work also shows that a malicious signer can reveal the verifier's secret key without being detected by using Trojan-horse attacks.

[1]  Yu-Guang Yang,et al.  Erratum: Arbitrated quantum signature of classical messages against collective amplitude damping noise (Opt. Commun. 283 (2010) 3198–3201) , 2010 .

[2]  Quantum Signature Protocol without the Trusted Third Party , 2005, quant-ph/0509129.

[3]  Hwayean Lee,et al.  Arbitrated quantum signature scheme with message recovery , 2004 .

[4]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[5]  V. Roychowdhury,et al.  Optimal encryption of quantum bits , 2000, quant-ph/0003059.

[6]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[7]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[8]  Shih,et al.  New high-intensity source of polarization-entangled photon pairs. , 1995, Physical review letters.

[9]  Qing-yu Cai,et al.  The "ping-pong" protocol can be attacked without eavesdropping. , 2003, Physical review letters.

[10]  Quan Zhang,et al.  Comment on: “Arbitrated quantum signature scheme with message recovery” [Phys. Lett. A 321 (2004) 295] , 2005 .

[11]  Quan Zhang,et al.  Quantum signature scheme with single photons , 2006 .

[12]  Tzonelih Hwang,et al.  On “Arbitrated quantum signature of classical messages against collective amplitude damping noise” , 2011 .

[13]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[14]  N. Lutkenhaus,et al.  Comment on ``Arbitrated quantum-signature scheme'' , 2008, 0806.0854.

[15]  M. Curty,et al.  Qubit authentication , 2001, quant-ph/0108100.

[16]  Ping Zhou,et al.  Robustness of two-way quantum communication protocols against Trojan horse attack , 2005 .

[17]  Guihua Zeng Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ” , 2008 .

[18]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[19]  Yun Liu,et al.  Quantum Message Signature Scheme without an Arbitrator , 2007, The First International Symposium on Data, Privacy, and E-Commerce (ISDPE 2007).

[20]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[21]  Quantum Digital Signatures , 2001, quant-ph/0105032.

[22]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..