Abstract
This paper points out that in Wang and Wei’s scheme (Quantum Inf Process 11:455–463, 2012), an eavesdropper, Eve, can replace the original message of a proxy signature with a forged one of her choice without being detected by the verifier. Accordingly, one of the security requirements of a quantum signature, i.e., unforgeability, may not be satisfied in their scheme. An improvement is given to avoid this attack, and the comparisons with the existing quantum proxy signature are also demonstrated.
Similar content being viewed by others
References
Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032v2, 15 November 2001
Hwang, T., Chong, S.K., Luo, Y.P., Wei, T.X.: New arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(12), 3144–3148 (2011)
Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “quantum blind signature based on two-state vector formalism. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0362-2
Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)
Yang, Y.-G., Wang, Y., Teng, Y.-W., Chai, H.-P., Wen, Q.-Y.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54(1), 84–88 (2010)
Wang, T.-Y., Wen, Q.-Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60307–060307 (2010)
Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)
Wang, T.-Y., Wei, Z.-L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)
Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54(10), 1828–1832 (2011)
Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. December 1984
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)
Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
Damgard, I.: A design principle for hash functions. In: Advances in Cryptology: Proceedings of CRYPTO’89. pp. 416–427. Santa Barbara, California, USA. 20–24 August 1989
Acknowledgments
We would like to thank the National Science Council of Republic of China for financial support of this research under Contract No. NSC 100-2221-E-006-152-MY3.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, CW., Luo, YP. & Hwang, T. Forgery attack on one-time proxy signature and the improvement. Quantum Inf Process 13, 2007–2016 (2014). https://doi.org/10.1007/s11128-014-0795-x
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-014-0795-x