Arbitrated Quantum Signature protocol using EPR pairs

Arbitrated signature provides that the signatory signs a message with his private key by quantum cryptography, while the signature receiver verifies the signature with the arbitrator’s assistance. In this work, security analysis was given to the arbitrated quantum signature (AQS) and results showed that the receiver Bob and the attacker can forge the signature. Then this paper gives a new quantum one-time pads encryption method, which is suit for the quantum signature. At last, a new AQS protocol using Einstein-Podoisky-Rosen (EPR) pairs is proposed. By using of  quantum key distribution (QKD) and new quantum one-time pads, the new scheme can resist Shor’s attack. The new scheme has following advantages: (1) The scheme reduces the complexity of implementation and provides a higher efficiency in transmission; (2) Compares with some AQS schemes, the scheme can avoid being disavowed by the receiver; (3) Compares with other AQS schemes, the scheme also guarantees the arbitrator cannot forge the signature and it also ensure the receiver and other attacker cannot forge the signature.

[1]  Hwayean Lee,et al.  Arbitrated quantum signature scheme with message recovery , 2004 .

[2]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[3]  M. Curty,et al.  Qubit authentication , 2001, quant-ph/0108100.

[4]  N. Lutkenhaus,et al.  Comment on ``Arbitrated quantum-signature scheme'' , 2008, 0806.0854.

[5]  V. Roychowdhury,et al.  Optimal encryption of quantum bits , 2000, quant-ph/0003059.

[6]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[7]  Guihua Zeng Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ” , 2008 .

[8]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[9]  J. Hornos,et al.  Analytical functions for the calculation of hyperspherical potential curves of atomic systems , 2000 .

[10]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[11]  Qiaoyan Wen,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011, 1106.4398.

[12]  M. A. Marchiolli,et al.  Quasiprobability distribution functions for finite-dimensional discrete phase spaces: Spin-tunneling effects in a toy model , 2008, 0805.0986.

[13]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[14]  Yuan Tian,et al.  A weak blind signature scheme based on quantum cryptography , 2009 .

[15]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[16]  Shih,et al.  New high-intensity source of polarization-entangled photon pairs. , 1995, Physical review letters.

[17]  Liusheng Huang,et al.  Quantum group blind signature scheme without entanglement , 2011 .

[18]  R. Cleve,et al.  Quantum fingerprinting. , 2001, Physical review letters.

[19]  Tzonelih Hwang,et al.  On “Arbitrated quantum signature of classical messages against collective amplitude damping noise” , 2011 .

[20]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[21]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.