Skip to main content
Log in

A New Secure Quantum Signature Masked Authentication Scheme

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

This paper proposes a new way of Quantum signature masked authentication, in which both user and certifying authority is needed for generating final signature. Our scheme uses decoy particle to protect key from all the attacks in the transmission process and does not require encryption of each key. The paper also shows that our scheme is protected against impersonation, forgery and outside attack and is more efficient than the other masked schemes existing in quantum cryptography.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data availability

Provided.

References

  1. Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE international conference on computers, systems and signal processing, Bangalore, India (pp 175–179).

  2. Ekert, A. (1991). Quantum cryptography based on Bell’s theorem. Physical Review Letters, 67(6), 661–663

    Article  MathSciNet  Google Scholar 

  3. Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states. Physical Review Letters, 68(21), 3121–3124

    Article  MathSciNet  Google Scholar 

  4. Bechmann-Pasquinucci, H., & Gisin, N. (1999). Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Physical Review A, 59(6), 4238–4248

    Article  MathSciNet  Google Scholar 

  5. Inoue, K., Waks, E., & Yamanoto, Y. (2003). Differential-phase-shift quantum key distribution using coherent light. Physical Review A, 68, 022317

    Article  Google Scholar 

  6. Scarani, V., Acin, A., Ribordy, G., & Gisin, N. (2004). Quantum cryptography protocols robust against photon number splitting attack. Physical Review Letters, 92, 057901

    Article  Google Scholar 

  7. Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner, N., & Scarani, V. (2004). Towards practical and fast quantum cryptography.

  8. Khan, M. M., Khan, M. M., & Arfeen, T. M. A. (2009). High error-rate quantum key distribution for long distance communication. New Journal of Physics, 11, 063043

    Article  Google Scholar 

  9. Esteban, E., & Serna, H. (2012). Quantum key distribution protocol with private- public key. arXiv: 0908.2146v4quant-ph May 12, 2012.

  10. Zhang, X. L. (2009). One-way quantum identity authentication based on public key. Chinese Science Bulletin, 54, 2018–2021

    Google Scholar 

  11. Serna, E. H. (2013). Quantum key distribution from a random seed. arXiv: 1311.1582v2quant-ph November 12, 2013.

  12. Shi, W., Yang, Y., & Zhou, Y. (2015). Quantum signature-masked authentication schemes. Optik, 126, 3544–3548

    Article  Google Scholar 

  13. Fatahi, N., & Afsheh, H. (2018). Secure electronic voting scheme by the new quantum signature-masked authentication. Physics & Astronomy International Journal, 2(6), 586–591

    Article  Google Scholar 

  14. Gottesman, D., & Chuang, I. (2019). Quantum digital signatures. https://arxiv.org/abs/quant-ph/0105032 (2001). Accessed September 2, 2019.

  15. Debnath, B., Das, J. C., De, D., Mondal, S. P., Ahmadian, A., Salimi, M., & Ferrara, M. (2020). Security analysis with novel image masking based quantum-dot cellular automata information security model. IEEE Access (pp. 117159–117172). Digital Object Identifier. https://doi.org/10.1109/ACCESS.2020.3002081

  16. Liu-Jun, W., Kai-Yi, Z., Jia-Yong, W., Jie, C., Yong-Hua, Y., Shi-Biao, T., Di, Y., Yan-Lin, T., Zhen, L., Yu, Y., Qiang, Z., & Jian-Wei, P. (2020). Experimental authentication of quantum key distribution with post-quantum cryptography (pp. 1–8). arXiv:2009.04662.

  17. Liu, B., Gao, Z., Xiao, Di., Huang, W., Zhang, Z., & Bingjie, Xu. (2019). Quantum identity authentication in the counterfactual quantum key distribution protocol. Entropy (Basel), 21(5), 518

    Article  MathSciNet  Google Scholar 

  18. Yang, L., Yang, B., & Pan, J. (2010). Quantum public-key encryption protocols with information-theoretic security. In T. Durt & V. N. Zadkov (Eds.), Proceedings of SPIE—The international society for optical engineering. (pp. 88401–88407). SPIE Press. https://doi.org/10.1117/12.922444

    Chapter  Google Scholar 

  19. Xin, X., Wang, Z., & Yang, Q. (2019). Identity-based quantum signature scheme with strong security. Optical and Quantum Electronics, 51, 393. https://doi.org/10.1007/s11082-019-2072-9

    Article  Google Scholar 

  20. Yang, Y. G., Lei, A. H., Liu, A. Z., Zhou, Y. H., & Shi, W. M. (2016). Arbitrated quantum signature scheme based on cluster states. Quantum Information Processing, 15, 2487–2497

    Article  MathSciNet  Google Scholar 

  21. Ekert, A., Hayden, P., & Inamori, H. (2000). Basic concepts in quantum computation. arXiv:quant-ph/0011013.

Download references

Funding

NA.

Author information

Authors and Affiliations

Authors

Contributions

We have proposed new quantum Quantum signature masked authentication protocol which is more secure than previously existing schemes.

Corresponding author

Correspondence to Vandani Verma.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Verma, V., Malhotra, K. A New Secure Quantum Signature Masked Authentication Scheme. Wireless Pers Commun 120, 1659–1674 (2021). https://doi.org/10.1007/s11277-021-08527-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08527-8

Keywords

Navigation