On the security of arbitrated quantum signature schemes

Due to the potential capability of providing unconditional security, arbitrated quantum signature (AQS) schemes, whose implementation depends on the participation of a trusted third party, received intense attention in the past decade. Recently, some typical AQS schemes were cryptanalyzed and improved. In this paper, we analyze the security property of some AQS schemes and show that all the previous AQS schemes, no matter whether original or improved, are still insecure in the sense that the messages and the corresponding signatures can be exchanged among different receivers, allowing the receivers to deny having accepted the signature of an appointed message. Some further improved methods on the AQS schemes are also discussed.

[1]  Dongyang Long,et al.  ENTANGLEMENT ENHANCES THE SECURITY OF ARBITRATED QUANTUM SIGNATURE , 2009 .

[2]  Zhiwei Sun,et al.  Improving the security of arbitrated quantum signature protocols , 2011 .

[3]  Adam D. Smith,et al.  Authentication of quantum messages , 2001, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..

[4]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[5]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[6]  G. Papadopoulos,et al.  Spinorial geometry, horizons and superconformal symmetry in six dimensions , 2014, 1404.3976.

[7]  M. Curty,et al.  Qubit authentication , 2001, quant-ph/0108100.

[8]  Guihua Zeng,et al.  Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.

[9]  Daowen Qiu,et al.  Security analysis and improvements of arbitrated quantum signature schemes , 2010 .

[10]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[11]  Yuan Tian,et al.  A group signature scheme based on quantum teleportation , 2010 .

[12]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[13]  Wen Xiao-jun,et al.  An E-payment system based on quantum group signature , 2010 .

[14]  Shih,et al.  New high-intensity source of polarization-entangled photon pairs. , 1995, Physical review letters.

[15]  Dowon Hong,et al.  Security problem on arbitrated quantum signature schemes , 2011 .

[16]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[17]  Hwayean Lee,et al.  Arbitrated quantum signature scheme with message recovery , 2004 .

[18]  Qiaoyan Wen,et al.  Cryptanalysis of the arbitrated quantum signature protocols , 2011, 1106.4398.

[19]  Quan Zhang,et al.  Comment on: “Arbitrated quantum signature scheme with message recovery” [Phys. Lett. A 321 (2004) 295] , 2005 .

[20]  Tzonelih Hwang,et al.  Comment on “Security analysis and improvements of arbitrated quantum signature schemes” , 2011, 1105.1232.

[21]  Qin Li,et al.  Arbitrated quantum signature scheme using Bell states , 2009 .