Quantum Signature Scheme for Participant Attack

2019 ◽  
Vol 75 (4) ◽  
pp. 271-276
Author(s):  
Kitak Won ◽  
Jino Heo ◽  
Chun Seok Yoon ◽  
Ji-Woong Choi ◽  
Hyung-Jin Yang
2020 ◽  
Vol 4 ◽  
pp. 75-82
Author(s):  
D.Yu. Guryanov ◽  
◽  
D.N. Moldovyan ◽  
A. A. Moldovyan ◽  

For the construction of post-quantum digital signature schemes that satisfy the strengthened criterion of resistance to quantum attacks, an algebraic carrier is proposed that allows one to define a hidden commutative group with two-dimensional cyclicity. Formulas are obtained that describe the set of elements that are permutable with a given fixed element. A post-quantum signature scheme based on the considered finite non-commutative associative algebra is described.


2012 ◽  
Vol 10 (04) ◽  
pp. 1250041 ◽  
Author(s):  
XUN-RU YIN ◽  
WEN-PING MA ◽  
WEI-YAN LIU

A quantum proxy group signature scheme is proposed with χ-type entangled states. Our scheme combines the properties of group signature and proxy signature. Moreover, the particles in the χ-type state sequence are used to distribute proxy warrants and quantum keys in the initial phase, and then used for quantum signature. Therefore it increases the utilization rate of quantum resources compared with the general quantum signature scheme. Finally, the unconditional security of our scheme is also analyzed.


2014 ◽  
Vol 23 (6) ◽  
pp. 060309 ◽  
Author(s):  
Chao Wang ◽  
Jian-Wei Liu ◽  
Tao Shang

2019 ◽  
Vol 18 (5) ◽  
Author(s):  
Yanyan Feng ◽  
Ronghua Shi ◽  
Jinjing Shi ◽  
Jian Zhou ◽  
Ying Guo

2012 ◽  
Vol 51 (7) ◽  
pp. 2135-2142 ◽  
Author(s):  
Ming-Xing Luo ◽  
Xiu-Bo Chen ◽  
Deng Yun ◽  
Yi-Xian Yang

2013 ◽  
Vol 11 (04) ◽  
pp. 1350036 ◽  
Author(s):  
YING GUO ◽  
XIN SUN ◽  
WEI ZHANG

A chaos-based arbitrated quantum signature (AQS) scheme is designed on the basis of an improved quantum chaotic encryption algorithm whose security is ensured due to the implementation of the quantum one-time pad that embraces the key-dependent chaotic operation string. It involves in a small-scale quantum computation network with three participants in three phases, i.e. initializing phase, signing phase and verifying phase. The signatory signs the encrypted message and then the receiver verifies the signature is valid with the aid of an arbitrator who plays a crucial role when a dispute arises. Analysis shows that the signature can neither be forged nor disavowed by the malicious attackers.


Sign in / Sign up

Export Citation Format

Share Document