quantum proxy signature
Recently Published Documents


TOTAL DOCUMENTS

13
(FIVE YEARS 7)

H-INDEX

5
(FIVE YEARS 1)

2020 ◽  
Vol 10 (17) ◽  
pp. 5770
Author(s):  
Yanyan Feng ◽  
Qian Zhang ◽  
Jinjing Shi ◽  
Shuhui Chen ◽  
Ronghua Shi

The quantum proxy signature is one of the most significant formalisms in quantum signatures. We put forward a quantum proxy signature scheme using quantum walk-based teleportation and quantum one-time pad CNOT (QOTP-CNOT) operation, which includes four phases, i.e., initializing phase, authorizing phase, signing phase and verifying phase. The QOTP-CNOT is achieved by attaching the CNOT operation upon the QOTP and it is applied to produce the proxy signature state. The quantum walk-based teleportation is employed to transfer the encrypted message copy derived from the binary random sequence from the proxy signer to the verifier, in which the required entangled states do not need to be prepared ahead and they can be automatically generated during quantum walks. Security analysis demonstrates that the presented proxy signature scheme has impossibility of denial from the proxy and original signers, impossibility of forgery from the original signatory and the verifier, and impossibility of repudiation from the verifier. Notably, the discussion shows the complexity of the presented algorithm and that the scheme can be applied in many real scenarios, such as electronic payment and electronic commerce.


2020 ◽  
Vol 59 (10) ◽  
pp. 3145-3155
Author(s):  
Tao Zheng ◽  
Yan Chang ◽  
Lili Yan ◽  
Shi-Bin Zhang

2020 ◽  
Vol 35 (24) ◽  
pp. 2050197
Author(s):  
Xiangjun Xin ◽  
Qinglan Yang ◽  
Fagen Li

A quantum proxy signature scheme makes the proxy signer can generate a quantum signature on behalf of the original signer. Although many quantum proxy signature schemes have been proposed, none of them can be formally proved to be secure. There is not even security model for the quantum proxy signatures. Some quantum proxy signature schemes have been proved to be insecure against forgery attacks. In this paper, first, the formal definition and the corresponding security model for the quantum proxy signatures are proposed. Second, based on the Hadamard operator and the controlled NOT operation, a new quantum proxy signature scheme is proposed. The security of our quantum proxy signature scheme can be formally proved under security model. The security model of the quantum proxy signatures is helpful for analyzing and improving the security of the quantum proxy signature schemes. On the other hand, compared with the other quantum proxy signatures, the new one proposed in this paper is the first that can be formally proved to be secure under security model.


2020 ◽  
Vol 16 (4) ◽  
pp. 155014772091477
Author(s):  
Jiahui Chen ◽  
Jie Ling ◽  
Jianting Ning ◽  
Emmanouil Panaousis ◽  
George Loukas ◽  
...  

Proxy signature is a very useful technique which allows the original signer to delegate the signing capability to a proxy signer to perform the signing operation. It finds wide applications especially in the distributed environment where the entities such as the wireless sensors are short of computational power and needed to be convinced to the authenticity of the server. Due to less proxy signature schemes in the post-quantum cryptography aspect, in this article, we investigate the proxy signature in the post-quantum setting so that it can resist against the potential attacks from the quantum adversaries. A general multivariate public key cryptographic proxy scheme based on a multivariate public key cryptographic signature scheme is proposed, and a heuristic security proof is given for our general construction. We show that the construction can reach Existential Unforgeability under an Adaptive Chosen Message Attack with Proxy Key Exposure assuming that the underlying signature is Existential Unforgeability under an Adaptive Chosen Message Attack. We then use our general scheme to construct practical proxy signature schemes for three well-known and promising multivariate public key cryptographic signature schemes. We implement our schemes and compare with several previous constructions to show our efficiency advantage, which further indicates the potential application prospect in the distributed network environment.


2020 ◽  
Vol 34 (16) ◽  
pp. 2050172
Author(s):  
Yanlong Xu ◽  
Guangbao Xu ◽  
Donghuan Jiang

With further research, the theory of local discrimination of orthogonal product states (OPSs) becomes more and more perfect. In this paper, we present a quantum proxy signature (QPS) scheme based on a set of OPSs that cannot be exactly discriminated by local operations and classical communation (LOCC). Our scheme possesses all the properties of QPS. More importantly, no one can obtain any meaningful information of a signature owing to the different particles of an OPS are separately transmitted. We show that our scheme is secure by a detailed security analysis.


2017 ◽  
Vol 56 (6) ◽  
pp. 1983-1994 ◽  
Author(s):  
Long Zhang ◽  
Hai-Yan Zhang ◽  
Ke-Jia Zhang ◽  
Qing-Le Wang

2016 ◽  
Vol 55 (9) ◽  
pp. 4081-4088 ◽  
Author(s):  
Hai-Jing Cao ◽  
Li-Yuan Ding ◽  
Yao-Feng Yu ◽  
Peng-Fei Li

Sign in / Sign up

Export Citation Format

Share Document