Abstract
Digital signatures are one of the key cryptographic components for providing authenticity and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced identity-based signature (IBS). Nearly all of the existing state-of-the-art IBS schemes are relying on the number-theoretic hardness assumptions. Unfortunately, these hard problems are insecure and face a threat in quantum world. Thus, it is high time to design and analyze IBS algorithms that can resist quantum attacks and provide long-term security. Quantum cryptography is one such technique to provide quantum-safe IBS. In this paper, we cryptanalyze the quantum cryptography-based IBS of Huang et al. (Huang et al. in Quantum Inf Process 22(1):36, 2022). We show that the design in (Huang et al. in Quantum Inf Process 22(1):36, 2022) is not secure against public key generator forgery attack, collusion attacks, and intercept and resend attacks. Next, we modify the design of (Huang et al. in Quantum Inf Process 22(1):36, 2022) and propose a new quantum IBS (namely qIBS) which is secure against the aforementioned attacks.



Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability statement
Data sharing is not applicable to this article as no new data were generated or analyzed to support this research.
References
Huang, Y., Xu, G., Song, X.: An improved efficient identity-based quantum signature scheme. Quantum Inf. Process. 22(1), 36 (2022)
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53 (1984). Springer
Ullah, S.S., Ullah, I., Khattak, H., Khan, M.A., Adnan, M., Hussain, S., Amin, N.U., Khattak, M.A.K.: A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things. IEEE Access 8, 98910–98928 (2020)
Wei, J., Liu, W., Hu, X.: Forward-secure identity-based signature with efficient revocation. Int. J. Comput. Math. 94(7), 1390–1411 (2017)
Ramadan, M., Liao, Y., Li, F., Zhou, S.: Identity-based signature with server-aided verification scheme for 5G mobile systems. IEEE Access 8, 51810–51820 (2020)
Zhao, J., Wei, B., Su, Y.: Communication-efficient revocable identity-based signature from multilinear maps. J. Ambient Intell. Humaniz. Comput. 10(1), 187–198 (2019)
Ko, H., Jeong, G., Kim, J., Kim, J., Oh, H.: Forward secure identity-based signature scheme with rsa. In: IFIP International Conference on ICT Systems Security and Privacy Protection, pp. 314–327 (2019). Springer
Song, D., Wen, F.: Efficient identity-based signature authentication scheme for smart home system. In: International Conference on Artificial Intelligence and Security, pp. 639–648 (2020). Springer
Wu, J.-D., Tseng, Y.-M., Huang, S.-S., Tsai, T.-T.: Leakage-resilient revocable identity-based signature with cloud revocation authority. Informatica 31(3), 597–620 (2020)
Wang, C.-J., Huang, H., Yuan, Y.: Efficient pairing-free provably secure scalable revocable identity-based signature scheme. J. Internet Technol. 21(2), 503–509 (2020)
Krzywiecki, Ł., Słowik, M., Szala, M.: Identity-based signature scheme secure in ephemeral setup and leakage scenarios. In: International Conference on Information Security Practice and Experience, pp. 310–324 (2019). Springer
Sahana, S.C., Das, M.L., Bhuyan, B.: A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance. Sādhanā 44(6), 1–9 (2019)
James, S., Reddy, P.V.: Efficient identity-based signature scheme with message recovery. In: Journal of Physics: Conference Series, vol. 1344, p. 012016 (2019). IOP Publishing
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Kravitz, D.W.: Digital signature algorithm. Google Patents. US Patent 5,231,668 (1993)
Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203–209 (1987)
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint quant-ph/0105032 (2001)
Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Zhang, L., Sun, H.-W., Zhang, K.-J., Jia, H.-Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16, 1–15 (2017)
Niu, X.-F., Ma, W.-P., Chen, B.-Q., Liu, G., Wang, Q.-Z.: A quantum proxy blind signature scheme based on superdense coding. Int. J. Theor. Phys. 59, 1121–1128 (2020)
Zheng, T., Chang, Y., Zhang, S.-B.: Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states. Quantum Inf. Process. 19, 1–15 (2020)
Yin, H.-L., Fu, Y., Li, C.-L., Weng, C.-X., Li, B.-H., Gu, J., Lu, Y.-S., Huang, S., Chen, Z.-B.: Experimental quantum secure network with digital signatures and encryption. NatL. Sci. Rev. 10(4), nwac228 (2022). https://doi.org/10.1093/nsr/nwac228
Xin, X., Wang, Z., Yang, Q.: Identity-based quantum signature scheme with strong security. Opt. Quantum Electron. 51, 1–13 (2019)
Xin, X., Wang, Z., Yang, Q.: Identity-based quantum signature based on bell states. Optik 200, 163388 (2020)
Xin, X., He, Q., Wang, Z., Yang, Q., Li, F.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)
Chen, F.-L., Liu, W.-F., Chen, S.-G., Wang, Z.-H.: Public-key quantum digital signature scheme with one-time pad private-key. Quantum Inf. Process. 17(1), 10 (2018)
Xin, X., Wang, Z., Yang, Q., Li, F.: Efficient identity-based public-key quantum signature scheme. Int. J. Mod. Phys. B 34(10), 2050087 (2020)
Liu, B., Zhu, P., Guo, K.: A secure and efficient identity-based quantum signature scheme. AIP Adv. 14(6) (2024)
Prajapat, S., Kumar, P., Kumar, S., Das, A.K., Shetty, S., Hossain, M.S.: Designing high-performance identity-based quantum signature protocol with strong security. IEEE Access (2024)
Acknowledgements
This work was supported by CEFIPRA CSRP Project No. 6701-1. The authors would like to thank the anonymous reviewers and the editor for providing their valuable suggestions and comments which helped us to improve the paper significantly.
Author information
Authors and Affiliations
Contributions
Y.S.R., V.S. and T.M. were responsible for conceptualization, methodology writing, original draft preparation, visualization and investigation. Y.S.R. and S.K.D. did supervision and project management. All authors did reviewing and editing.
Corresponding author
Ethics declarations
Conflict of interest
The authors state that they have not known competing financial interests or personal connections that may seem to have influenced the work described in this study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Rao, Y.S., Srivastava, V., Mohanty, T. et al. Cryptanalysis of a quantum identity-based signature and its improvement. Quantum Inf Process 23, 318 (2024). https://doi.org/10.1007/s11128-024-04523-6
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-024-04523-6