Skip to main content
Log in

One-time proxy signature based on quantum cryptography

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

We propose a new one-time proxy signature scheme with decoherence-free states. We analyze its security and show that it is not possible to forge a valid proxy signature even if an opponent has infinite resources. Furthermore, the differences between this scheme and others are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M., Usuda K., Okamoto E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79(A(9)), 1338–1353 (1996)

    Google Scholar 

  2. Wang T.Y., Cai X.Q., Zhang J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

    Google Scholar 

  3. Cao F., Cao Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)

    Article  MATH  Google Scholar 

  4. Kim, H., Baek, J., Lee, B., et al.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Proceedings of SCIS’2001, pp. 845–850. Oiso, Japan (2001)

  5. Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Proceedings of Asiacrypt 2003, pp. 507–522. Springer, Berlin (2003)

  6. Mehta M., Harn L.: Efficient one-time proxy signatures. IEE Proc. Commun. 152(2), 129–133 (2005)

    Article  Google Scholar 

  7. Bicakci K.: One-time proxy signatures revisited. Comput. Stand. Interfaces 29(4), 499–505 (2007)

    Article  Google Scholar 

  8. Shor P.: Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  9. Grover L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)

    Article  ADS  Google Scholar 

  10. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, London (1984)

  11. Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  12. Wang T.Y., Wen Q.Y., Chen X.B. et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)

    Article  ADS  Google Scholar 

  13. Wang T.Y., Wen Q.Y., Gao F. et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

    Article  ADS  MATH  Google Scholar 

  14. Wang T.Y., Wen Q.Y., Zhu F.C.: Economical quantum anonymous transmissions. J. Phys. B: At. Mol. Opt. Phys. 43(24), 245501 (2010)

    Article  ADS  Google Scholar 

  15. Wang T.Y., Wen Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)

    MathSciNet  Google Scholar 

  16. Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032

  17. Zeng G.H., Christoph H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  ADS  Google Scholar 

  18. Lee H., Hong C., Kim H., Lim J. et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  19. Li Q., Chan W.H., Long D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  20. Wen X.J., Niu X.M., Jia L.P. et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)

    Article  ADS  Google Scholar 

  21. Wang T.Y., Wen Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)

    Article  MathSciNet  ADS  Google Scholar 

  22. Yang Y.G., Zhou Z., Teng Y.W. et al.: Arbitrated quantum signature with an untrusted arbitrator. The Euro. Phys. J. D 61(3), 773–778 (2011)

    Article  ADS  Google Scholar 

  23. Yang Y.G., Wen Q.Y., Zhu F.C.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17(2), 415–418 (2008)

    Article  ADS  Google Scholar 

  24. Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quant. Inf. Proc. doi:10.1007/s11128-010-0225-7

  25. Damgård, I.: A design principle for hash functions. In: Proceedings of the Crypto’89, pp. 416–427. Springer, Berlin (1990)

  26. Lidar D.A., Chang I.L., Whaley K.B.: Decoherence-free subspaces for quantum computation. Phys. Rev. Lett. 81(12), 2594–2597 (1998)

    Article  ADS  Google Scholar 

  27. Walton Z.D., Abouraddy A.F., Sergienko A.V. et al.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91(8), 087901 (2003)

    Article  ADS  Google Scholar 

  28. Boileau J.C, Laflamme R., Laforest M. et al.: Robust quantum communication using a polarization-entangled photon pair. Phys. Rev. Lett. 93(22), 220501 (2004)

    Article  ADS  Google Scholar 

  29. Wang X.B.: Fault tolerant quantum key distribution protocol with collective random unitary noise. Phys. Rev. A 72(5), 050304 (2005)

    Article  ADS  Google Scholar 

  30. Li X.H., Deng F.G., Zhou H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)

    Article  ADS  Google Scholar 

  31. Cabello A.: Six-qubit permutation-based decoherence-free orthogonal basis. Phys. Rev. A 75(2), 020301 (2007)

    Article  MathSciNet  ADS  Google Scholar 

  32. Sun Y., Wen Q.Y., Gao F. et al.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)

    Article  ADS  Google Scholar 

  33. Qin S.J., Wen Q.Y., Meng L.M. et al.: Quantum secure direct communication over the collective amplitude damping channel. Sci. China. Ser. G 52(8), 1208–1212 (2009)

    Article  Google Scholar 

  34. Wang T.Y., Wen Q.Y., Zhu F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)

    Article  ADS  Google Scholar 

  35. Majgier K., Maassen H., Zyczkowski K.: Protected subspaces in quantum information. Quant. Inf. Proc. 9(3), 343–367 (2010)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian-Yin Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, TY., Wei, ZL. One-time proxy signature based on quantum cryptography. Quantum Inf Process 11, 455–463 (2012). https://doi.org/10.1007/s11128-011-0258-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-011-0258-6

Keywords

Navigation