Abstract
In this paper, we propose a group signature scheme based on Bell states, which restricts the group member Alice to transmit the signature message to a fully quantum ability group manager TP through semi-quantum communication, then TP sends the signature message to an outsider verifier Bob to verify the signature. The signature message is sent by TP which can ensure Alice’s anonymous in group signature scheme. Besides, the limited Alice is a “classic” user in semi-quantum communication and can only measure, prepare, reorder and send quantum states only in the classical basis {\( \left| 0 \right\rangle \), \( \left| 1 \right\rangle \)}, while the quantum TP can perform arbitrary quantum operations. Besides, the “classical” user Alice does not require quantum memory. Finally, the security analysis shows that the scheme can not only resist the repudiation of the signer and denial of the verifier, but also detect the forgery of the attacker, and the efficiency of the scheme is slightly higher than most of the previous signature schemes.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Diffie, W.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (1976)
Shor, P.W.: Polynominal-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Sci. Statist. Comput. 26, 1484–1509 (1997)
Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)
Barnum, H., Crepeau, C., Gottesman, D., et al.: Authentication of quantum messages, pp. 449–58. IEEE Computer Society, Washington, DC (2002)
Busch, P., Heinonen, T., Lahti, P.: Heisenberg’s uncertainty principle. Phys. Rep. 452(6), 155–176 (2007)
Yang, Y., Wen, Q.: Sci. China Ser. G Phys. Mech. Astron. 51, 1505 (2008)
Wen, X., et al.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010)
Su, Q., Li, W.-M.: Improved group signature scheme based on quantum teleportation. Int. J. Theor. Phys. 53(4), 1208–1216 (2013). https://doi.org/10.1007/s10773-013-1917-4
Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)
Chou, Y.-H., Lin, F.-J., Zeng, G.-J.: An efficient novel online shopping mechanism based on quantum communication. Electron. Commer. Res. 14(3), 349–367 (2014). https://doi.org/10.1007/s10660-014-9143-6
Zhang, J.Z., Yang, Y.Y., Xie, S.C.: A third-party e-payment protocol based on quantum group blind signature. Int. J. Theor. Phys. 56(9), 2981–2989 (2017)
Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)
Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)
Sun, Z.W., Du, R.G., Long, D.Y.: Quantum key distribution with limited classical Bob. Int. J. Quant. Inform. 11(1), 1350005 (2013)
Zou, X., Qiu, D., Zhang, S., Mateus, P.: Semiquantum key distribution without invoking the classical party’s measurement capability. Quantum Inf. Process. 14(8), 2981–2996 (2015). https://doi.org/10.1007/s11128-015-1015-z
Zhang, W., Qiu, D.W.: A single-state semi-quantum key distribution protocol and its security proof. arXiv:quant-ph/161203087 (2017)
Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)
Zou, X.F., Qiu, D.W.: Three-step semi-quantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696–1702 (2014)
Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)
Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 46(4), 045304 (2013)
Yan, L.L., Chang, Y., Zhang, S.B.: Measure-resend semi-quantum private comparison scheme using GHZ class states. Comput. Mater. Continua 61(2), 877–887 (2019)
Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)
Chang, Y., Zhang, S.B., Yan, L.L.: A quantum authorization management protocol based on EPR-pairs. Comput. Mater. Continua 59(3), 1005–1014 (2019)
Zhang, S.B., Chang, Y., Yan, L.L.: Quantum communication networks and trust management: a survey. Comput. Mater. Continua 61(3), 1145–1174 (2019)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
Mayers, D.: Unconditional security in quantum cryptography. J. Assoc.: Comput. Math. 48(1), 351–406 (2001)
Inamon, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599–627 (2007)
Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1–2), 23–25 (2006)
Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)
Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)
Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)
Zhang, K., Song, T., Zuo, H., et al.: A secure quantum group signature scheme based on Bell states. Phys. Scr. 87(4), 045012 (2013)
Acknowledgement
This work is supported by the National Natural Science Foundation of China (No. 61572086, No. 61402058), the Key Research and Development Project of Sichuan Province (No. 20ZDYF2324, No. 2019ZYD027, No. 2018TJPT0012), the Innovation Team of Quantum Security Communication of Sichuan Province (No. 17TD0009), the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province (No. 2016120080102643), the Application Foundation Project of Sichuan Province(No. 2017JY0168), the Science and Technology Support Project of Sichuan Province (No. 2018GZ0204, No. 2016FZ0112).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Dai, J., Zhang, S., Chang, Y., Li, X., Zheng, T. (2020). A Semi-quantum Group Signature Scheme Based on Bell States. In: Sun, X., Wang, J., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2020. Lecture Notes in Computer Science(), vol 12240. Springer, Cham. https://doi.org/10.1007/978-3-030-57881-7_22
Download citation
DOI: https://doi.org/10.1007/978-3-030-57881-7_22
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57880-0
Online ISBN: 978-3-030-57881-7
eBook Packages: Computer ScienceComputer Science (R0)