Abstract
In this paper, a novel quantum (t, n) threshold group signature scheme is demonstrated on a basis of d-dimensional quantum system. In the scheme, n signatories form a group, and only t or more signatories can generate a valid signature on behalf of this group by means of using the cyclic characteristics of mutually unbiased bases (MUBs). The verifier receives the signature and checks the validation of it by performing the measurements in the specific MUB on the d-dimensional single qudits with the help of a trusted arbitrator. Security analysis shows that our scheme satisfies the requirements of quantum threshold group signature protocol: unforgeability, non-reputation, threshold security, and signatory’s privacy. Moreover, our scheme designs a novel method to prevent the known-signature attack that also can be used in other arbitrated quantum signature schemes with the quantum one-time-pad encryption. In terms of efficiency, the proposed scheme uses single qudits instead of common entangled states to restore the initial messages. The difficulty of generating the required single qudits would not grow with the number of signatories involved. Therefore, our scheme has huge advantages in scalability compared to other related schemes and can be realized with current technology.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Bennett, C.: G. Brassard in Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India (New York) (1984)
Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)
Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin, J.A., Wootters, W.K.: Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76(5), 722 (1996)
Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)
Busch, P., Heinonen, T., Lahti, P.: Heisenberg’s uncertainty principle. Phys. Rep. 452(6), 155–176 (2007)
Childs, A., Jao, D., Soukharev, V.: Constructing elliptic curve isogenies in quantum subexponential time. J. Math. Cryptol. 8(1), 1–29 (2014)
Deng, F.G., Zhou, H.Y., Long, G.L.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337(4–6), 329–334 (2005)
Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638
Ekert, A.K.: Quantum cryptography based on bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1991)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032 (2001)
Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proc. Comput. Digital Tech. 141(5), 307–313 (1994)
Hillery, M., Bužek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)
Lidar, D.A., Brun, T.A.: Quantum Error Correction. Cambridge University Press (2013)
Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050–2056 (1999)
Padgett, M.J.: Orbital angular momentum 25 years on. Opt. Express 25(10), 11265–11274 (2017)
Pinnell, J., Nape, I., de Oliveira, M., TabeBordbar, N., Forbes, A.: Experimental demonstration of 11-dimensional 10-party quantum secret sharing. Laser Photonics Rev. 14(9), 2000012 (2020)
Qin, H., Tang, W.K., Tso, R.: Quantum (t, n) threshold group signature based on bell state. Quantum Inf. Process. 19(2), 71 (2020)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Shi, J., Shi, R., Guo, Y., Peng, X., Lee, M.H., Park, D.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transform. Int. J. Theor. Phys. 51(4), 1038–1049 (2012)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)
Wootters, W.K., Fields, B.D.: Optimal state-determination by mutually unbiased measurements. Ann. Phys. 191(2), 363–381 (1989)
Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802–803 (1982)
Yang, Y., Wen, Q.: Quantum threshold group signature. Sci. China Ser. G: Phys. Mech. Astron. 51(10), 1505–1514 (2008)
Zhang, C., Liu, C., Hu, Q., Cai, Z., Su, W., Xia, C., Zhu, Y., Wang, S., Liu, J.: Satellite UV-VIS spectroscopy: implications for air quality trends and their driving forces in china during 2005–2017. Light Sci Appl 8(1), 1–12 (2019)
Funding
This work was supported by the National Natural Science Foundation of China (No. 62172385) and the Anhui Initiative in Quantum Information Technologies (No. AHY150300).
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Gao, M., Yang, W. & Liu, Y. A novel quantum (t, n) threshold group signature based on d-dimensional quantum system. Quantum Inf Process 20, 288 (2021). https://doi.org/10.1007/s11128-021-03236-4
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-021-03236-4