Quantum designated verifier signature based on Bell states

Recently, Shi et al. proposed two quantum designated verifier signature (QDVS) schemes. First, we demonstrate the forgery attack and repudiation attack to Shi et al.’s quantum QDVS schemes. Then, a new QDVS scheme based on Bell states is proposed. Our scheme overcomes the security drawbacks of Shi et al.’s scheme. It is secure against forgery attack, repudiation attack, inter-resending attack, impersonation attack and Trojan horse attack. What is more, our scheme has a strong security. It can be proved to be information-theoretically secure. Our scheme also has the properties such as designated verification, non-transferability and hiding source. On the other hand, in our scheme, the partners need not use any quantum one-way function or perform any quantum state comparison algorithm. The qubit efficiency of our scheme can achieve 66.7%. Therefore, our scheme is more secure and efficient than the similar schemes.

[1]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[2]  Yu-Guang Yang,et al.  A Real Quantum Designated Verifier Signature Scheme , 2015, International Journal of Theoretical Physics.

[3]  Yu-Guang Yang,et al.  A scheme on converting quantum signature with public verifiability into quantum designated verifier signature , 2018, Optik.

[4]  Yingying Zhang,et al.  An Improved Arbitrated Quantum Scheme with Bell States , 2018 .

[5]  Zhuo Wang,et al.  Quantum signature scheme based on Hadamard and Hπ/4 operators. , 2019, Applied optics.

[6]  Mahboobeh Houshmand,et al.  Optimizing Teleportation Cost in Distributed Quantum Circuits , 2016, ArXiv.

[7]  Guang-Bao Xu,et al.  A novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states , 2019, Quantum Inf. Process..

[8]  Yang Li,et al.  Quantum probabilistic encryption scheme based on conjugate coding , 2012, China Communications.

[9]  G. Long,et al.  Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.

[10]  Fagen Li,et al.  Security analysis and improvement of an arbitrated quantum signature scheme , 2019, Optik.

[11]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[12]  Yu Cheng,et al.  A Quantum Blind Signature Scheme Based on Block Encryption and Quantum Fourier Transfer , 2019, International Journal of Theoretical Physics.

[13]  Xue Wang,et al.  An efficient quantum digital signature for classical messages , 2018, Quantum Inf. Process..

[14]  Dong Hoon Lee,et al.  Forgery attacks on Kang et al.'s identity-based strong designated verifier signature scheme and its improvement with security proof , 2010, Comput. Electr. Eng..

[15]  Shu-Cui Xie,et al.  Improvement of a Quantum Proxy Blind Signature Scheme , 2018, International Journal of Theoretical Physics.

[16]  Markus Jakobsson,et al.  Designated Verifier Proofs and Their Applications , 1996, EUROCRYPT.

[17]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[18]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[19]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[20]  Ed Dawson,et al.  A novel identity-based strong designated verifier signature scheme , 2009, J. Syst. Softw..

[21]  Parvin Rastegari,et al.  Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model , 2019, International Journal of Information Security.

[22]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[23]  Guang-Bao Xu,et al.  Arbitrary Quantum Signature Based on Local Indistinguishability of Orthogonal Product States , 2019, International Journal of Theoretical Physics.

[24]  Li Yang,et al.  Quantum Public-Key Encryption with Information Theoretic Security , 2010, 1006.0354.

[25]  Tzonelih Hwang,et al.  EPR quantum key distribution protocols with potential 100% qubit efficiency , 2007, IET Inf. Secur..