Skip to main content
Log in

A Real Quantum Designated Verifier Signature Scheme

  • Published:
International Journal of Theoretical Physics Aims and scope Submit manuscript

Abstract

The effectiveness of most quantum signature schemes reported in the literature can be verified by a designated person, however, those quantum signature schemes aren’t the real traditional designated verifier signature schemes, because the designated person hasn’t the capability to efficiently simulate a signature which is indistinguishable from a signer, which cannot satisfy the requirements in some special environments such as E-voting, call for tenders and software licensing. For solving this problem, a real quantum designated verifier signature scheme is proposed in this paper. According to the property of unitary transformation and quantum one-way function, only a verifier designated by a signer can verify the “validity of a signature” and the designated verifier cannot prove to a third party that the signature was produced by the signer or by himself through a transcript simulation algorithm. Moreover, the quantum key distribution and quantum encryption algorithm guarantee the unconditional security of this scheme. Analysis results show that this new scheme satisfies the main security requirements of designated verifier signature scheme and the major attack strategies.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Advances in Cryptology-Eurocrypt’96, LNCS, Vol. 1070, pp. 143–154. Springer-Verlag (1996)

  2. Kang, B., Boyd, C., Dawson, E.: A novel identity-based strong designated verifier signature scheme. J. Syst. Softw. 82(2), 270–273 (2009)

    Article  Google Scholar 

  3. Lee, J., Chang, J., Lee, D.: Forgery attacks on Kang et al.s identity-based strong designated verifier signature scheme and its improvement with security proof. Computers & Electrical Engineering, doi:10.1016/j.compeleceng.2010.02.001

  4. Gottesman, D., Chuang, I.: Quantum digital signatures, arXiv:quant-ph/0105032v2 (2001)

  5. Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  MathSciNet  ADS  Google Scholar 

  6. Curty, M., Lütkenhaus, N.: Comment on “arbitrated quantum-signature scheme”. Phys. Rev. A 77(4), 046301 (2008)

    Article  ADS  Google Scholar 

  7. Zeng, G.H.: Reply to “comment on ‘arbitrated quantum-signature scheme”’. Phys. Rev. A 78(1), 016301 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  8. Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295–300 (2004)

    Article  MathSciNet  ADS  Google Scholar 

  9. Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: “arbitrated quantum signature scheme with message recovery”. Phys. Lett. A 347, 262–263 (2005)

    Article  ADS  Google Scholar 

  10. Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  11. Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)

    Article  ADS  Google Scholar 

  12. Hwang, T., Luo, Y.-P., Chong, S.-K.: Comment on “security analysis and improvements of arbitrated quantum signature schemes”. Phys. Rev. A 85, 056301 (2012)

  13. Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)

    Article  ADS  Google Scholar 

  14. Liu, F., Qin, S.-J., Su, Q.: An arbitrated quantum signature scheme with fast signing and verifying. Quantum Inf Process 13, 491–502 (2014)

    Article  MATH  Google Scholar 

  15. Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)

    Article  ADS  Google Scholar 

  16. Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283 (19), 3830 (2010)

    Article  ADS  Google Scholar 

  17. Chong, S.K., Luo, Y.P., Hwang, T.: On “arbitrated quantum signature of classical messages against collective amplitude damping noise”. Opt. Commun. 284 (3), 893–895 (2011)

    Article  ADS  Google Scholar 

  18. Hwang, T., Chong, S.K., Luo, Y.P., Wei, T.X.: New arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284 (12), 3144–3148 (2011)

    Article  ADS  Google Scholar 

  19. Wang, T, Wen, Q: Fair quantum blind signatures. Chin. Phys. B 19, 060307 (2010)

    Article  ADS  Google Scholar 

  20. Wang, T.-Y., Weim, Z.-L.: One-time proxy signature based on quantum Cryptography. Quantum Inf. Process 11, 455–463 (2012). doi:10.1007/s11128-011-0258-6

    Article  MathSciNet  Google Scholar 

  21. Wen, X.J., Tian, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)

    Article  ADS  Google Scholar 

  22. Bennett, C.H., Brassard G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175–179. IEEE, India. New York (1984)

  23. Long, G L, Liu, X S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65(03), 2302 (2002)

    Article  ADS  Google Scholar 

  24. Deng, F G, Long, G L, Liu, X S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(04), 2317 (2003)

    ADS  Google Scholar 

  25. Ekert, A K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67, 661–664 (1991)

    Article  MATH  MathSciNet  ADS  Google Scholar 

  26. Gottesman, D., Chuang, I.: Quantum digital signature. arXiv:0105032 (2001)

  27. Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with 100 % qubit efficiency. IET Inf. Secur. 1(1), 43–45 (2007)

    Article  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61170270, 61170221, 61272044); The Specialized Research Fund for the Doctoral Program of Higher Education(Grant Nos. 20091103120014, 20090005110010); Beijing Natural Science Foundation(Grant Nos. 4122008.1102004); the ISN open Foundation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Min Shi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, WM., Zhou, YH. & Yang, YG. A Real Quantum Designated Verifier Signature Scheme. Int J Theor Phys 54, 3115–3123 (2015). https://doi.org/10.1007/s10773-015-2549-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10773-015-2549-7

Keywords

Navigation