Abstract
We propose a new one-time proxy signature scheme with decoherence-free states. We analyze its security and show that it is not possible to forge a valid proxy signature even if an opponent has infinite resources. Furthermore, the differences between this scheme and others are discussed.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Mambo M., Usuda K., Okamoto E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79(A(9)), 1338–1353 (1996)
Wang T.Y., Cai X.Q., Zhang J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)
Cao F., Cao Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)
Kim, H., Baek, J., Lee, B., et al.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Proceedings of SCIS’2001, pp. 845–850. Oiso, Japan (2001)
Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Proceedings of Asiacrypt 2003, pp. 507–522. Springer, Berlin (2003)
Mehta M., Harn L.: Efficient one-time proxy signatures. IEE Proc. Commun. 152(2), 129–133 (2005)
Bicakci K.: One-time proxy signatures revisited. Comput. Stand. Interfaces 29(4), 499–505 (2007)
Shor P.: Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Grover L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, London (1984)
Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
Wang T.Y., Wen Q.Y., Chen X.B. et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)
Wang T.Y., Wen Q.Y., Gao F. et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang T.Y., Wen Q.Y., Zhu F.C.: Economical quantum anonymous transmissions. J. Phys. B: At. Mol. Opt. Phys. 43(24), 245501 (2010)
Wang T.Y., Wen Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032
Zeng G.H., Christoph H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)
Lee H., Hong C., Kim H., Lim J. et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)
Li Q., Chan W.H., Long D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)
Wen X.J., Niu X.M., Jia L.P. et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)
Wang T.Y., Wen Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)
Yang Y.G., Zhou Z., Teng Y.W. et al.: Arbitrated quantum signature with an untrusted arbitrator. The Euro. Phys. J. D 61(3), 773–778 (2011)
Yang Y.G., Wen Q.Y., Zhu F.C.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17(2), 415–418 (2008)
Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quant. Inf. Proc. doi:10.1007/s11128-010-0225-7
Damgård, I.: A design principle for hash functions. In: Proceedings of the Crypto’89, pp. 416–427. Springer, Berlin (1990)
Lidar D.A., Chang I.L., Whaley K.B.: Decoherence-free subspaces for quantum computation. Phys. Rev. Lett. 81(12), 2594–2597 (1998)
Walton Z.D., Abouraddy A.F., Sergienko A.V. et al.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91(8), 087901 (2003)
Boileau J.C, Laflamme R., Laforest M. et al.: Robust quantum communication using a polarization-entangled photon pair. Phys. Rev. Lett. 93(22), 220501 (2004)
Wang X.B.: Fault tolerant quantum key distribution protocol with collective random unitary noise. Phys. Rev. A 72(5), 050304 (2005)
Li X.H., Deng F.G., Zhou H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)
Cabello A.: Six-qubit permutation-based decoherence-free orthogonal basis. Phys. Rev. A 75(2), 020301 (2007)
Sun Y., Wen Q.Y., Gao F. et al.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)
Qin S.J., Wen Q.Y., Meng L.M. et al.: Quantum secure direct communication over the collective amplitude damping channel. Sci. China. Ser. G 52(8), 1208–1212 (2009)
Wang T.Y., Wen Q.Y., Zhu F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)
Majgier K., Maassen H., Zyczkowski K.: Protected subspaces in quantum information. Quant. Inf. Proc. 9(3), 343–367 (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, TY., Wei, ZL. One-time proxy signature based on quantum cryptography. Quantum Inf Process 11, 455–463 (2012). https://doi.org/10.1007/s11128-011-0258-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-011-0258-6