Skip to main content
Log in

Cryptanalysis of a quantum identity-based signature and its improvement

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Digital signatures are one of the key cryptographic components for providing authenticity and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced identity-based signature (IBS). Nearly all of the existing state-of-the-art IBS schemes are relying on the number-theoretic hardness assumptions. Unfortunately, these hard problems are insecure and face a threat in quantum world. Thus, it is high time to design and analyze IBS algorithms that can resist quantum attacks and provide long-term security. Quantum cryptography is one such technique to provide quantum-safe IBS. In this paper, we cryptanalyze the quantum cryptography-based IBS of Huang et al. (Huang et al. in Quantum Inf Process 22(1):36, 2022). We show that the design in (Huang et al. in Quantum Inf Process 22(1):36, 2022) is not secure against public key generator forgery attack, collusion attacks, and intercept and resend attacks. Next, we modify the design of (Huang et al. in Quantum Inf Process 22(1):36, 2022) and propose a new quantum IBS (namely qIBS) which is secure against the aforementioned attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability statement

Data sharing is not applicable to this article as no new data were generated or analyzed to support this research.

References

  1. Huang, Y., Xu, G., Song, X.: An improved efficient identity-based quantum signature scheme. Quantum Inf. Process. 22(1), 36 (2022)

    Article  ADS  MathSciNet  Google Scholar 

  2. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53 (1984). Springer

  3. Ullah, S.S., Ullah, I., Khattak, H., Khan, M.A., Adnan, M., Hussain, S., Amin, N.U., Khattak, M.A.K.: A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things. IEEE Access 8, 98910–98928 (2020)

    Article  Google Scholar 

  4. Wei, J., Liu, W., Hu, X.: Forward-secure identity-based signature with efficient revocation. Int. J. Comput. Math. 94(7), 1390–1411 (2017)

    Article  MathSciNet  Google Scholar 

  5. Ramadan, M., Liao, Y., Li, F., Zhou, S.: Identity-based signature with server-aided verification scheme for 5G mobile systems. IEEE Access 8, 51810–51820 (2020)

    Article  Google Scholar 

  6. Zhao, J., Wei, B., Su, Y.: Communication-efficient revocable identity-based signature from multilinear maps. J. Ambient Intell. Humaniz. Comput. 10(1), 187–198 (2019)

    Article  Google Scholar 

  7. Ko, H., Jeong, G., Kim, J., Kim, J., Oh, H.: Forward secure identity-based signature scheme with rsa. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 314–327 (2019). Springer

  8. Song, D., Wen, F.: Efficient identity-based signature authentication scheme for smart home system. In: International Conference on Artificial Intelligence and Security, pp. 639–648 (2020). Springer

  9. Wu, J.-D., Tseng, Y.-M., Huang, S.-S., Tsai, T.-T.: Leakage-resilient revocable identity-based signature with cloud revocation authority. Informatica 31(3), 597–620 (2020)

    Article  MathSciNet  Google Scholar 

  10. Wang, C.-J., Huang, H., Yuan, Y.: Efficient pairing-free provably secure scalable revocable identity-based signature scheme. J. Internet Technol. 21(2), 503–509 (2020)

    Google Scholar 

  11. Krzywiecki, Ł., Słowik, M., Szala, M.: Identity-based signature scheme secure in ephemeral setup and leakage scenarios. In: International Conference on Information Security Practice and Experience, pp. 310–324 (2019). Springer

  12. Sahana, S.C., Das, M.L., Bhuyan, B.: A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance. Sādhanā 44(6), 1–9 (2019)

    Article  MathSciNet  Google Scholar 

  13. James, S., Reddy, P.V.: Efficient identity-based signature scheme with message recovery. In: Journal of Physics: Conference Series, vol. 1344, p. 012016 (2019). IOP Publishing

  14. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  15. Kravitz, D.W.: Digital signature algorithm. Google Patents. US Patent 5,231,668 (1993)

  16. Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)

    Article  MathSciNet  Google Scholar 

  17. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  ADS  MathSciNet  Google Scholar 

  18. Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint quant-ph/0105032 (2001)

  19. Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

    Article  ADS  Google Scholar 

  20. Zhang, L., Sun, H.-W., Zhang, K.-J., Jia, H.-Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16, 1–15 (2017)

    Article  ADS  MathSciNet  Google Scholar 

  21. Niu, X.-F., Ma, W.-P., Chen, B.-Q., Liu, G., Wang, Q.-Z.: A quantum proxy blind signature scheme based on superdense coding. Int. J. Theor. Phys. 59, 1121–1128 (2020)

    Article  MathSciNet  Google Scholar 

  22. Zheng, T., Chang, Y., Zhang, S.-B.: Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states. Quantum Inf. Process. 19, 1–15 (2020)

    Article  ADS  MathSciNet  Google Scholar 

  23. Yin, H.-L., Fu, Y., Li, C.-L., Weng, C.-X., Li, B.-H., Gu, J., Lu, Y.-S., Huang, S., Chen, Z.-B.: Experimental quantum secure network with digital signatures and encryption. NatL. Sci. Rev. 10(4), nwac228 (2022). https://doi.org/10.1093/nsr/nwac228

    Article  Google Scholar 

  24. Xin, X., Wang, Z., Yang, Q.: Identity-based quantum signature scheme with strong security. Opt. Quantum Electron. 51, 1–13 (2019)

    Article  Google Scholar 

  25. Xin, X., Wang, Z., Yang, Q.: Identity-based quantum signature based on bell states. Optik 200, 163388 (2020)

    Article  Google Scholar 

  26. Xin, X., He, Q., Wang, Z., Yang, Q., Li, F.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)

    Article  Google Scholar 

  27. Chen, F.-L., Liu, W.-F., Chen, S.-G., Wang, Z.-H.: Public-key quantum digital signature scheme with one-time pad private-key. Quantum Inf. Process. 17(1), 10 (2018)

    Article  ADS  MathSciNet  Google Scholar 

  28. Xin, X., Wang, Z., Yang, Q., Li, F.: Efficient identity-based public-key quantum signature scheme. Int. J. Mod. Phys. B 34(10), 2050087 (2020)

    Article  ADS  MathSciNet  Google Scholar 

  29. Liu, B., Zhu, P., Guo, K.: A secure and efficient identity-based quantum signature scheme. AIP Adv. 14(6) (2024)

  30. Prajapat, S., Kumar, P., Kumar, S., Das, A.K., Shetty, S., Hossain, M.S.: Designing high-performance identity-based quantum signature protocol with strong security. IEEE Access (2024)

Download references

Acknowledgements

This work was supported by CEFIPRA CSRP Project No. 6701-1. The authors would like to thank the anonymous reviewers and the editor for providing their valuable suggestions and comments which helped us to improve the paper significantly.

Author information

Authors and Affiliations

Authors

Contributions

Y.S.R., V.S. and T.M. were responsible for conceptualization, methodology writing, original draft preparation, visualization and investigation. Y.S.R. and S.K.D. did supervision and project management. All authors did reviewing and editing.

Corresponding author

Correspondence to Vikas Srivastava.

Ethics declarations

Conflict of interest

The authors state that they have not known competing financial interests or personal connections that may seem to have influenced the work described in this study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rao, Y.S., Srivastava, V., Mohanty, T. et al. Cryptanalysis of a quantum identity-based signature and its improvement. Quantum Inf Process 23, 318 (2024). https://doi.org/10.1007/s11128-024-04523-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-024-04523-6

Keywords