Skip to main content
Log in

Forgery attack on one-time proxy signature and the improvement

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

This paper points out that in Wang and Wei’s scheme (Quantum Inf Process 11:455–463, 2012), an eavesdropper, Eve, can replace the original message of a proxy signature with a forged one of her choice without being detected by the verifier. Accordingly, one of the security requirements of a quantum signature, i.e., unforgeability, may not be satisfied in their scheme. An improvement is given to avoid this attack, and the comparisons with the existing quantum proxy signature are also demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  MathSciNet  ADS  Google Scholar 

  2. Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032v2, 15 November 2001

  3. Hwang, T., Chong, S.K., Luo, Y.P., Wei, T.X.: New arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(12), 3144–3148 (2011)

    Article  ADS  Google Scholar 

  4. Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on “quantum blind signature based on two-state vector formalism. Quantum Inf. Process. (2012). doi:10.1007/s11128-012-0362-2

  5. Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198–3201 (2010)

    Article  ADS  Google Scholar 

  6. Yang, Y.-G., Wang, Y., Teng, Y.-W., Chai, H.-P., Wen, Q.-Y.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54(1), 84–88 (2010)

    Article  ADS  MATH  Google Scholar 

  7. Wang, T.-Y., Wen, Q.-Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60307–060307 (2010)

    Article  Google Scholar 

  8. Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408–4410 (2010)

    Article  ADS  Google Scholar 

  9. Wang, T.-Y., Wei, Z.-L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455–463 (2012)

    Article  MathSciNet  ADS  Google Scholar 

  10. Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54(10), 1828–1832 (2011)

    Article  ADS  Google Scholar 

  11. Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179. December 1984

  12. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  13. Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121–3124 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  14. Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)

    Article  ADS  Google Scholar 

  15. Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  ADS  Google Scholar 

  16. Damgard, I.: A design principle for hash functions. In: Advances in Cryptology: Proceedings of CRYPTO’89. pp. 416–427. Santa Barbara, California, USA. 20–24 August 1989

Download references

Acknowledgments

We would like to thank the National Science Council of Republic of China for financial support of this research under Contract No. NSC 100-2221-E-006-152-MY3.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tzonelih Hwang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, CW., Luo, YP. & Hwang, T. Forgery attack on one-time proxy signature and the improvement. Quantum Inf Process 13, 2007–2016 (2014). https://doi.org/10.1007/s11128-014-0795-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-014-0795-x

Keywords

Navigation