Abstract
We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end.
Similar content being viewed by others
References
Chaum, D.: Blind signature for untraceable payments. Advances in cryptology. In: Proceeding of Crypto82, pp. 199–203. Springer, New York (1983)
Chaum, D.: Elections with unconditionally-secret ballots and disruption equivelent to breaking RAS. Advances in cryptology. In: Proceedings of Euro-Crypto88, pp. 177–189. Springer, Berlin (1988)
Brands, S.: Untraceble off-line cash in wallet with observers. Advances in cryptology. In: Proceeding of Crypto93, pp. 302–318. Springer, Berlin (1994)
Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)
Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549–558 (2013)
Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651–1657 (2013)
Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136–1137 (1995)
Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811–813 (1996)
Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Grover, L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)
Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)
Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Economical quantum anonymous transmissions. J. Phys. B At. Mol. Opt. Phys. 43(24), 245501 (2010)
Gao, F., Qin, S.J., Guo, F., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630–635 (2011)
Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)
Zeng, G.H., Christoph, H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Lee, H., Hong, C., Kim, H., Lim, J., et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)
Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)
Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Euro. Phys. J. D 61(3), 773–778 (2011)
Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653–670 (2011)
Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)
Zuo, H.J., Zhang, Kj, Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343–2353 (2013)
Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12(5), 1991–1997 (2013)
Li, Y.B., Wen, Q.Y., Li, Z.C., et al.: Cheat sensitive quantum bit commitment via pre- and post-selected quantum states. Quantum Inf. Process. 13(1), 141–149 (2014)
Wen, X.J., Niu, X.M., Jia, L.P., et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)
Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)
Su, Q., Huang, Z., Wen, Q.Y., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283, 4408–4410 (2010)
Naseri, M.: Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6(21), 5051–5053 (2011)
He, L.B., Huang, L.S., Yang, W., et al.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 030306 (2012)
Cai, X.Q., Niu, H.F.: Partially blind signatures based on quantum cryptography. Int. J. Mod. Phys. B 26(30), 1250163 (2012)
Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12(6), 2071–2085 (2013)
Siavash, K., Ali, Z.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121–130 (2014)
Acknowledgments
We are grateful to the anonymous reviewers for helpful comments. This work was supported by the National Natural Science Foundation of China (Grant Nos. 61202317, 61272015), the China Scholarship for Studying at Abroad, the Program for Science & Technology Innovation Talents in Universities of Henan Province (Grant No. 13HASTIT042), the Young Key Teacher Foundation in Universities of Henan Province (Grant No. 2012GGJS-157), the Natural Science Foundation of Henan Province (Grant No. 132300410316), and the Natural Science Foundation of Education Bureau of Henan Province (Grant No. 13B110150).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, TY., Cai, XQ. & Zhang, RL. Security of a sessional blind signature based on quantum cryptograph. Quantum Inf Process 13, 1677–1685 (2014). https://doi.org/10.1007/s11128-014-0760-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0760-8