Skip to main content
Log in

Security of a sessional blind signature based on quantum cryptograph

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chaum, D.: Blind signature for untraceable payments. Advances in cryptology. In: Proceeding of Crypto82, pp. 199–203. Springer, New York (1983)

  2. Chaum, D.: Elections with unconditionally-secret ballots and disruption equivelent to breaking RAS. Advances in cryptology. In: Proceedings of Euro-Crypto88, pp. 177–189. Springer, Berlin (1988)

  3. Brands, S.: Untraceble off-line cash in wallet with observers. Advances in cryptology. In: Proceeding of Crypto93, pp. 302–318. Springer, Berlin (1994)

  4. Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

    Google Scholar 

  5. Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  6. Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651–1657 (2013)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  7. Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)

    Article  Google Scholar 

  8. Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)

    Article  Google Scholar 

  9. Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  10. Grover, L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)

    Article  ADS  Google Scholar 

  11. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press (1984)

  12. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  13. Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)

    Article  ADS  Google Scholar 

  14. Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

    Article  ADS  MATH  Google Scholar 

  15. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)

    Article  ADS  Google Scholar 

  16. Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Economical quantum anonymous transmissions. J. Phys. B At. Mol. Opt. Phys. 43(24), 245501 (2010)

    Article  ADS  Google Scholar 

  17. Gao, F., Qin, S.J., Guo, F., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)

    Article  ADS  Google Scholar 

  18. Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)

    MathSciNet  Google Scholar 

  19. Zeng, G.H., Christoph, H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  ADS  Google Scholar 

  20. Lee, H., Hong, C., Kim, H., Lim, J., et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  21. Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  22. Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Euro. Phys. J. D 61(3), 773–778 (2011)

    Article  ADS  Google Scholar 

  23. Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653–670 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  24. Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)

    Article  MathSciNet  ADS  Google Scholar 

  25. Zuo, H.J., Zhang, Kj, Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  26. Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12(5), 1991–1997 (2013)

    Article  MathSciNet  ADS  Google Scholar 

  27. Li, Y.B., Wen, Q.Y., Li, Z.C., et al.: Cheat sensitive quantum bit commitment via pre- and post-selected quantum states. Quantum Inf. Process. 13(1), 141–149 (2014)

  28. Wen, X.J., Niu, X.M., Jia, L.P., et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)

    Article  ADS  Google Scholar 

  29. Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)

    Article  ADS  Google Scholar 

  30. Su, Q., Huang, Z., Wen, Q.Y., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283, 4408–4410 (2010)

    Article  Google Scholar 

  31. Naseri, M.: Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6(21), 5051–5053 (2011)

    MathSciNet  Google Scholar 

  32. He, L.B., Huang, L.S., Yang, W., et al.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 030306 (2012)

    Article  ADS  Google Scholar 

  33. Cai, X.Q., Niu, H.F.: Partially blind signatures based on quantum cryptography. Int. J. Mod. Phys. B 26(30), 1250163 (2012)

    Article  ADS  MATH  Google Scholar 

  34. Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12(6), 2071–2085 (2013)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  35. Siavash, K., Ali, Z.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121–130 (2014)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

We are grateful to the anonymous reviewers for helpful comments. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61202317, 61272015), the China Scholarship for Studying at Abroad, the Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042), the Young Key Teacher Foundation in Universities of Henan Province (Grant No. 2012GGJS-157), the Natural Science Foundation of Henan Province (Grant No. 132300410316), and the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 13B110150).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tian-Yin Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, TY., Cai, XQ. & Zhang, RL. Security of a sessional blind signature based on quantum cryptograph. Quantum Inf Process 13, 1677–1685 (2014). https://doi.org/10.1007/s11128-014-0760-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0760-8

Keywords

Navigation