Quantum designated verifier signature based on Bell states
Recently, Shi et al. proposed two quantum designated verifier signature (QDVS) schemes. First, we demonstrate the forgery attack and repudiation attack to Shi et al.’s quantum QDVS schemes. Then, a new QDVS scheme based on Bell states is proposed. Our scheme overcomes the security drawbacks of Shi et al.’s scheme. It is secure against forgery attack, repudiation attack, inter-resending attack, impersonation attack and Trojan horse attack. What is more, our scheme has a strong security. It can be proved to be information-theoretically secure. Our scheme also has the properties such as designated verification, non-transferability and hiding source. On the other hand, in our scheme, the partners need not use any quantum one-way function or perform any quantum state comparison algorithm. The qubit efficiency of our scheme can achieve 66.7%. Therefore, our scheme is more secure and efficient than the similar schemes.
KeywordsQuantum signature Designated verifier Non-transferability Unforgeability Bell states
- 1.Jakobsson, M., Sako, K., Impagliazzo, R.: Designated verifier proofs and their applications. In: Maurer, U. (ed.) Advances in Cryptology-Eurocrypt 1996, LNCS 1070, pp. 142–154. Springer, Berlin (1996)Google Scholar
- 8.Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv: quant-ph/0105032 (2001)Google Scholar
- 20.Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block. Phys. Rev. A 68(04), 2317 (2003)Google Scholar
- 23.Yang, L., Yang, B., Pan, J.: Quantum public-key encryption with information theoretic security. In: Proceedings of SPIE—The International Society for Optical Engineering, IEEE press, New York, vol. 8440, (2010)Google Scholar