A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant

Quantum dual-signature means that two signed quantum messages are combined and expected to be sent to two different recipients. A quantum signature requires the cooperation of two verifiers to complete the whole verification process. As an important quantum signature aspect, the trusted third party is introduced to the current protocols, which affects the practicability of the quantum signature protocols. In this paper, we propose a quantum dual-signature protocol without arbitrator and entanglement for the first time. In the proposed protocol, two independent verifiers are introduced, here they may be dishonest but not collaborate. Furthermore, strongly nonlocal orthogonal product states are used to preserve the protocol security, i.e., no one can deny or forge a valid signature, even though some of them conspired. Compared with existing quantum signature protocols, this protocol does not require a trusted third party and entanglement resources.

[1]  Fuguo Deng,et al.  Improving the security of multiparty quantum secret sharing against Trojan horse attack , 2005, quant-ph/0506194.

[2]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[3]  Hwayean Lee,et al.  Quantum direct communication with authentication , 2005, quant-ph/0512051.

[4]  Wei-Wei Zhang,et al.  Improving the security of arbitrated quantum signature against the forgery attack , 2013, Quantum Inf. Process..

[5]  Noah Linden,et al.  Nonlocal content of quantum operations , 2001 .

[6]  Yang Liu,et al.  Measurement-device-independent quantum key distribution over untrustful metropolitan network , 2015, 1509.08389.

[7]  Gang Xu,et al.  Perfect Quantum Network Coding Independent of Classical Network Solutions , 2015, IEEE Communications Letters.

[8]  Guo‐Feng Zhang,et al.  Swap operation in the presence of Zeeman inhomogeneity in coupled quantum dots , 2014 .

[9]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[10]  Qiaoyan Wen,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011, 1106.4398.

[11]  Li-Hua Gong,et al.  A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .

[12]  V. Roychowdhury,et al.  Optimal encryption of quantum bits , 2000, quant-ph/0003059.

[13]  Jino Heo,et al.  Controlled mutual quantum entity authentication with an untrusted third party , 2018, Quantum Inf. Process..

[14]  M. Koashi,et al.  Quantum entanglement for secret sharing and secret splitting , 1999 .

[15]  C. Hong,et al.  Quantum secure direct communication network with hyperentanglement , 2014 .

[16]  Zhi-Xi Wang,et al.  Deterministic secure direct communication using GHZ states and swapping quantum entanglement , 2004, quant-ph/0406082.

[17]  Xin-Wen Wang,et al.  Controlled teleportation against uncooperation of part of supervisors , 2009, Quantum Inf. Process..

[18]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[19]  Xin Ji,et al.  Three-party quantum secure direct communication based on GHZ states , 2006, quant-ph/0601125.

[20]  Ping Zhou,et al.  Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state , 2005, quant-ph/0511223.

[21]  Jongin Lim,et al.  Controlled mutual quantum entity authentication using entanglement swapping , 2015 .

[22]  Shun Zhang,et al.  Comment on “Controlled mutual quantum entity authentication with an untrusted third party” , 2020, Quantum Inf. Process..

[23]  王志玺,et al.  Controlled quantum teleportation and secure direct communication , 2005 .

[24]  Chuan Wang,et al.  Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state , 2005 .

[25]  Fuguo Deng,et al.  Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement , 2005, quant-ph/0501129.

[26]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .

[27]  Jian-Wei Pan,et al.  Efficient multiparty quantum-secret-sharing schemes , 2004, quant-ph/0405179.

[28]  H. Briegel,et al.  Experimental demonstration of five-photon entanglement and open-destination teleportation , 2004, Nature.

[29]  Interplay between the Dzyaloshinskii-Moriya anisotropic antisymmetric interaction and the SWAP operation in a two-qubit Heisenberg model , 2007 .

[30]  Ying Guo,et al.  Quantum dual signature scheme based on coherent states with entanglement swapping , 2016 .

[31]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[32]  S. Bandyopadhyay,et al.  Strong Quantum Nonlocality without Entanglement. , 2018, Physical review letters.

[33]  Wei Yang,et al.  Quantum Teleportation via GHZ-like State , 2009 .

[34]  Fuguo Deng,et al.  Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs (4 pages) , 2005, quant-ph/0504158.

[35]  Gilles Brassard,et al.  An Update on Quantum Cryptography , 1985, CRYPTO.

[36]  Wang Tian-yin,et al.  Controlled quantum teleportation with Bell states , 2011 .

[37]  Sunghwan Kim,et al.  Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes , 2019, International Journal of Theoretical Physics.

[38]  Jongin Lim,et al.  N quantum channels are sufficient for Multi-user Quantum Key Distribution protocol between n users , 2010 .

[39]  Dazu Huang,et al.  Quantum blind dual-signature scheme without arbitrator , 2016 .