Skip to main content
Log in

Comment on “The enhanced quantum blind signature protocol”

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

The Original Article was published on 31 January 2012

Abstract

Recently, Yang et al. (Quantum Inf Process 12:109–117, 2013) proposed an enhancement on a quantum blind signature based on the two-state vector formalism, afterward a special attack strategy on Yang et al.’s enhanced scheme is put forward, in which the dishonest signer can illegally reveal 25 % of the message of the blind signature requester, but an effective solution has not been presented in their paper. In this paper, we further analyze Yang el al.’s enhanced scheme and find that there is another potential loophole which the blind signature requester can forge the message signer’s signature. Then, an improvement scheme is proposed. Finally, analysis results show that our improved scheme can withstand the blind signature requester’s forgery attack and the above special attack strategy, and our quantum efficiency will still be the same as the primary scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Chaum, D.: Blind signature for untraceable payments. In: Proceedings of CRYPTO’82, pp. 199–203 (1983)

  2. Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm problem. Electron. Lett. 31(14), 1136–1137 (1995)

    Article  Google Scholar 

  3. Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666–669 (2009)

    Article  ADS  Google Scholar 

  4. Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), (2010)

  5. He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 030306 (2012)

    Article  ADS  Google Scholar 

  6. Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12, 2071–2085 (2013). doi:10.1007/s11128-012-0509-1

    Article  MathSciNet  ADS  MATH  Google Scholar 

  7. Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with \(X\)-type entangled states. Int. J. Theor. Phys. 51, 455 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  8. Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.-X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86(5), 055006 (2012)

    Article  MATH  Google Scholar 

  9. Zuo, H.J.: Cryptanalysis of quantum blind signature scheme. Int. J. Theor. Phys. (2012). doi:10.1007/s10773-012-1337-x

  10. Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. Ch. Phys. Mech. Astron. 56(9), 1636–1641 (2013). doi:10.1007/s11433-013-5170-x

    Article  MathSciNet  ADS  Google Scholar 

  11. Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. (2013). doi:10.1007/s11128-013-0529-5

  12. Su, Q., Zheng, H., Qiaoyan, W., Wenmin, L.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)

    Article  ADS  Google Scholar 

  13. Yang, C.W., Hwang, T., Luo, Y.P.: Enhancement on “Quantum blind signature based on two-state vector formalism”. Quantum Inf. Process. 12, 109–117 (2013)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  14. Zhang, M., Xu, G.A., Xiu, B.C., Yang, S., YangY, X.: Attack on the improved quantum blind signature protocol. Int. J. Theor. Phys. 52, 331–335 (2013)

    Article  MathSciNet  MATH  Google Scholar 

  15. Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829–1834 (1999)

    Article  MathSciNet  ADS  Google Scholar 

  16. Banerjee, A., Pathak, A.: Maximally efficient protocols for direct secure quantum communication. Phys. Lett. A 376, 2944–2950 (2012)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant No: 61003290, 61272044); Beijing Natural Science Foundation (Grant No. 4122008); Funding Project for Academic Human Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality (No. CIT&TCD 201304039).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei-Min Shi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Shi, WM., Zhou, YH. & Yang, YG. Comment on “The enhanced quantum blind signature protocol”. Quantum Inf Process 13, 1305–1312 (2014). https://doi.org/10.1007/s11128-014-0744-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0744-8

Keywords