Skip to main content

A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing

  • Conference paper
  • First Online:
Security and Privacy in New Computing Environments (SPNCE 2019)

Abstract

The basic idea of quantum secret sharing is to share classical information through quantum schemes. In reality, the number of secret bits shared will vary according to the actual situation. For this reason, a secret sharing scheme of double qubits is constructed based on single particle. At the same time, combined with the needs of real life in e-commerce, this paper proposes a quantum blind signature protocol suitable for electronic cash payment scenarios. In this protocol, the blinding of the message is an XOR operation, which makes the solution simpler and easier to implement, and the owner of the message cannot be tracked. Moreover, we use quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security. The quantum blind signature applied to the electronic payment system proposed in this paper could protect user’s anonymity as the traditional E-payment systems do, and also have unconditional security which the classical E-payment systems cannot provide. Security analysis shows that our scheme is unforgeability, undeniability, blindness and unconditionally secure.

Supported by the National Natural Science Foundation of China (Grant No. U1304614, U1204703), Henan Province Education Science Plan General Topic “Research on Trusted Degree Certification Based on Block-chain” (Grant No. (2018)-JKGHYB-0279), Zhengzhou Innovative Science and Technology Talent Team Construction Project Fund Project (Grant No. 131PCXTD597), Henan Science and Technology Project (Grant No. 162102310238).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MathSciNet  Google Scholar 

  2. Blakley, G.R.: Safeguarding cryptographic keys. IEEE Comput. Soc. 48, 313–317 (1979)

    Google Scholar 

  3. Shen, C.: Research on trusted computing and its development. Sci. China Inf. Sci. 53(3), 405–433 (2010)

    Article  Google Scholar 

  4. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829–1834 (1999)

    Article  MathSciNet  Google Scholar 

  5. Kogias, L., Xiang, Y., He, Q.Y., et al.: Unconditional security of entanglement based quantum secret sharing schemes. Phys. Rev. A 95(1), 012315 (2017)

    Article  Google Scholar 

  6. Long, Y.X., Long, D.Y., Qiu, D.W.: Sharing classic secret information with maximum true entangled hexagonal state. J. Comput. Sci. Technol. 6(5), 465–472 (2012)

    Google Scholar 

  7. Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162–168 (1999)

    Article  Google Scholar 

  8. Tyc, T., Sanders, B.C.: How to share a continuous-variable quantum secret by optical interferometry. Phys. Rev. A 65, 042310 (2002)

    Article  Google Scholar 

  9. Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247–251 (2003)

    Article  MathSciNet  Google Scholar 

  10. Yan, F.L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 72, 012304 (2005)

    Article  Google Scholar 

  11. Markham, D., Sanders, B.C.: Graph States for Quantum Secret Sharing. arXiv:0808.1532v1 (2008)

  12. Li, W.Z., Liu, Z.W.: Multi-party quantum secret sharing scheme based on GHZ state for flawless operation. Comput. Appl. Res. 33(2), 491–494 (2016)

    Google Scholar 

  13. G, M., W, X.M.: A multi-party secret sharing scheme based on quantum theory. Appl. Res. Comput. 35(7), 2135–2145 (2018)

    Google Scholar 

  14. Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199–203. Springer, Boston (1983). https://doi.org/10.1007/978-1-4757-0602-4_18

    Chapter  Google Scholar 

  15. Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)

    Article  Google Scholar 

  16. Zhang, J.L., Zhang, J.Z., Xie, S.C.: Improvement of a quantum proxy blind signature scheme. Int. J. Theor. Phys. 57(6), 1612–1621 (2018)

    Article  MathSciNet  Google Scholar 

  17. Zhang, J.L., Xie, S.C., Zhang, J.Z.: An elaborate secure quantum voting scheme. Int. J. Theoret. Phys. 56(10), 3019–3028 (2017)

    Article  Google Scholar 

  18. Guo, W., Zhang, J.Z., Li, Y.P., et al.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55(8), 3524–3536 (2016)

    Article  MathSciNet  Google Scholar 

  19. Zhang, J.L., Zhang, J.Z., Xie, S.C.: A choreographed distributed electronic voting scheme. Int. J. Theoret. Phys. 57(9), 2676–2686 (2018)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ming-sheng Hu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zhang, Jl., Hu, Ms., Gong, B., Jia, ZJ., Wang, LP. (2019). A Blind Signature Scheme Applying on Electronic Payment Scene Based on Quantum Secret Sharing. In: Li, J., Liu, Z., Peng, H. (eds) Security and Privacy in New Computing Environments. SPNCE 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 284. Springer, Cham. https://doi.org/10.1007/978-3-030-21373-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-21373-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-21372-5

  • Online ISBN: 978-3-030-21373-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics