Advertisement

The postprocessing of quantum digital signatures

  • Tian-Yin Wang
  • Jian-Feng Ma
  • Xiao-Qiu Cai
Article

Abstract

Many novel quantum digital signature proposals have been proposed, which can effectively guarantee the information-theoretic security of the signature for a singe bit against forging and denying. Using the current basic building blocks of signing a single bit, we give a new proposal to construct an entire protocol for signing a long message. Compared with the previous work, it can improve at least 33.33% efficiency.

Keywords

Quantum digital signature Integrity Forgery attack Authentication 

Notes

Acknowledgements

We are grateful to the anonymous referees for helpful comment and detailed suggestion on revisions. This work was supported by the National High Technology Research and Development Program (863 Program) (Grant No. 2015AA011704), the Key Program of NSFC Union Foundation (Grant Nos. U1135002, U1405255), the National Natural Science Foundation of China (Grant Nos. 61202317, 61572246, 61602232, 61472048), the Plan for Scientific Innovation Talents of Henan Province (Grant No. 164100510003), the Program for Science and Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042) and the Key Scientific Research Project in Universities of Henan Province (Grant Nos. 16A520021, 16A120007).

References

  1. 1.
    Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)MathSciNetCrossRefMATHGoogle Scholar
  2. 2.
    Wei, H.R., Deng, F.G.: Scalable quantum computing based on stationary spin qubits in coupled quantum dots inside double-sided optical microcavities. Sci. Rep. 4, 7551 (2014)ADSCrossRefGoogle Scholar
  3. 3.
    Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032 (2001)
  4. 4.
    Jrn, M.Q.: Quantum pseudosignatures. J. Mod. Opt. 49, 1269–1276 (2002)MathSciNetCrossRefGoogle Scholar
  5. 5.
    Lu, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. ICACT 1, 514–517 (2005)Google Scholar
  6. 6.
    Clarke, P.J., Collins, R.J., Dunjko, V., et al.: Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light. Nat. Commun. 3, 1174 (2012)ADSCrossRefGoogle Scholar
  7. 7.
    Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112, 040502 (2014)ADSCrossRefGoogle Scholar
  8. 8.
    Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2015)ADSCrossRefGoogle Scholar
  9. 9.
    Collins, R.J., Donaldson, R.J., Vedran, D., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014)ADSCrossRefGoogle Scholar
  10. 10.
    Donaldson, R.J., Collins, R.J., Kleczkowska, K., et al.: Experimental demonstration of kilometer-range quantum digital signatures. Phys. Rev. A 93, 012329 (2016)ADSCrossRefGoogle Scholar
  11. 11.
    Amiri, R., Wallden, P., Kent, A., et al.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93, 032325 (2016)ADSCrossRefGoogle Scholar
  12. 12.
    Yin, H.L., Fu, Y., Chen, Z.B.: Practical quantum digital signature. Phys. Rev. A 93, 032316 (2016)ADSCrossRefGoogle Scholar
  13. 13.
    Arrazola, J.M., Wallden, P., Andersson, E.: Multiparty quantum signature schemes. Quantum Inf. Comput. 6, 0435 (2016)MathSciNetGoogle Scholar
  14. 14.
    Swanson, C.M., Stinson, D.R.: Unconditionally secure signature schemes revisited. Inf. Theor. Sec. 6673, 100 (2011)MATHGoogle Scholar
  15. 15.
    Wang, T.Y., Cai, X.Q., Ren, Y.L., et al.: Security of quantum digital signatures for classical messages. Sci. Rep. 5, 9231 (2015)ADSCrossRefGoogle Scholar
  16. 16.
    Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)ADSCrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2016

Authors and Affiliations

  1. 1.School of Computer Science and TechnologyXidian UniversityXi’anChina
  2. 2.School of Mathematical ScienceLuoyang Normal UniversityLuoyangChina
  3. 3.Start Travel Collaborative Innovation Center of Zhongyuan Economic AreaLuoyang Normal UniversityLuoyangChina
  4. 4.School of Network and Information SecurityXidian UniversityXi’anChina

Personalised recommendations