A New Quantum Proxy Signature Model Based on a Series of Genuine Entangled States

2018 ◽  
Vol 58 (2) ◽  
pp. 591-604 ◽  
Author(s):  
Hai-Yan Zhang ◽  
Long Zhang ◽  
Ke-Jia Zhang
2012 ◽  
Vol 10 (04) ◽  
pp. 1250041 ◽  
Author(s):  
XUN-RU YIN ◽  
WEN-PING MA ◽  
WEI-YAN LIU

A quantum proxy group signature scheme is proposed with χ-type entangled states. Our scheme combines the properties of group signature and proxy signature. Moreover, the particles in the χ-type state sequence are used to distribute proxy warrants and quantum keys in the initial phase, and then used for quantum signature. Therefore it increases the utilization rate of quantum resources compared with the general quantum signature scheme. Finally, the unconditional security of our scheme is also analyzed.


2013 ◽  
Vol 11 (03) ◽  
pp. 1350030
Author(s):  
HUI-JUAN ZUO ◽  
SU-JUAN QIN ◽  
TING-TING SONG

Recently, Yin et al. (Int. J. Quantum Inform. 10 (2012) 1250041) proposed a quantum proxy group signature scheme with χ-type entangled states. The scheme combines the properties of group signature and proxy signature. The study points out that the semi-honest Trent can give the forged signature under the assumption of this scheme. And, we find that even if the three parties honestly perform the scheme, the signature still cannot be realized with high efficiency.


2020 ◽  
Vol 59 (10) ◽  
pp. 3145-3155
Author(s):  
Tao Zheng ◽  
Yan Chang ◽  
Lili Yan ◽  
Shi-Bin Zhang

2020 ◽  
Vol 10 (17) ◽  
pp. 5770
Author(s):  
Yanyan Feng ◽  
Qian Zhang ◽  
Jinjing Shi ◽  
Shuhui Chen ◽  
Ronghua Shi

The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes four phases, i.e., initializing phase, authorizing phase, signing phase and verifying phase. The QOTP-CNOT is achieved by attaching the CNOT operation upon the QOTP and it is applied to produce the proxy signature state. The quantum walk-based teleportation is employed to transfer the encrypted message copy derived from the binary random sequence from the proxy signer to the verifier, in which the required entangled states do not need to be prepared ahead and they can be automatically generated during quantum walks. Security analysis demonstrates that the presented proxy signature scheme has impossibility of denial from the proxy and original signers, impossibility of forgery from the original signatory and the verifier, and impossibility of repudiation from the verifier. Notably, the discussion shows the complexity of the presented algorithm and that the scheme can be applied in many real scenarios, such as electronic payment and electronic commerce.


2020 ◽  
Vol 16 (4) ◽  
pp. 155014772091477
Author(s):  
Jiahui Chen ◽  
Jie Ling ◽  
Jianting Ning ◽  
Emmanouil Panaousis ◽  
George Loukas ◽  
...  

Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. We show that the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack. We then use our general scheme to construct practical proxy signature schemes for three well-known and promising multivariate public key cryptographic signature schemes. We implement our schemes and compare with several previous constructions to show our efficiency advantage, which further indicates the potential application prospect in the distributed network environment.


2016 ◽  
Vol 55 (9) ◽  
pp. 4081-4088 ◽  
Author(s):  
Hai-Jing Cao ◽  
Li-Yuan Ding ◽  
Yao-Feng Yu ◽  
Peng-Fei Li

Sign in / Sign up

Export Citation Format

Share Document