Literature DB >> 35052137

A Verifiable Arbitrated Quantum Signature Scheme Based on Controlled Quantum Teleportation.

Dianjun Lu1,2, Zhihui Li1, Jing Yu1, Zhaowei Han1.   

Abstract

In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy particles, applying the functional values of symmetric bivariate polynomial. As such, eavesdropping detection and identity authentication can both be executed. The security analysis shows that our scheme can neither be disavowed by the signatory nor denied by the verifier, and it cannot be forged by any malicious attacker.

Entities:  

Keywords:  Bell measurement; arbitrated quantum signature; controlled quantum teleportation; verifiability; von Neumann measurement

Year:  2022        PMID: 35052137      PMCID: PMC8774689          DOI: 10.3390/e24010111

Source DB:  PubMed          Journal:  Entropy (Basel)        ISSN: 1099-4300            Impact factor:   2.524


1. Introduction

Since Bennett and Brassard [1] proposed the quantum key distribution (QKD) protocol in 1984, quantum cryptography has attracted extensive attention. Its security is guaranteed by the principles of quantum mechanics such as the Heisenberg uncertainty principle and the quantum no-cloning theorem. Quantum cryptography can provide the advantage of unconditional security, making the research of quantum cryptography increasingly important. Many important quantum cryptography branches have been developed, such as quantum key distribution [2,3], quantum signature (QS) [4,5,6], quantum teleportation (QT) [7], quantum authentication [8], and deterministic secure quantum communication [9]. Quantum signatures can be applied to verify the identity of the sender and the integrity of the information. The arbitrated quantum signature (AQS), providing many merits, has attracted much attention. In 2002, Zeng et al. [10] proposed the first arbitrated quantum signature scheme using the Green–Horne–Zeilinger (GHZ) state and the quantum one-time pad (QOTP). Based on the design of the classical arbitrated digital signature, the scheme provides a re-verification service for signatory and receiver using the online signature provided by a trusted third party arbitrator. In 2008, Curty and Lutkenhaus [11] investigated the scheme [10], and they claimed that it was not clearly described and that the safety analysis was incorrect. In response to the controversy of Curty et al., Zeng et al. [12] proved the scheme [10] in more detail. In 2009, to reduce the complexity and improve the efficiency of the protocol [10], Li et al. [13] proposed an AQS scheme based on the Bell states rather than the GHZ states and proved its advantages in terms of transmission efficiency and low complexity. Unfortunately, in 2010, Zou and Qiu [14] argued that Li’s AQS scheme can be disavowed by the receiver, and they proposed an AQS protocol that uses bulletin boards and other security schemes that do not use entangled state. Their scheme further simplified the protocol of Li et al., and an improved AQS scheme was designed using single particles that can resist the denunciation of the receiver, thus reducing the difficulty of the physical implementation of AQS. However, in 2011, Gao et al. [15] conducted the first comprehensive cryptanalysis of previous AQS schemes in terms of forgery and disavowal. They found that the existing AQS schemes based on QOTP encryption [13,14] all have some security problems. In other words, the receiver Bob can realize the existence of the forgery of a signature under the known message attack, while the sender Alice can successfully disavow any signature of hers through a simple attack. Choi et al. [16] found that most AQS protocols can be cracked through a specific existential forgery attack due to the careless taking advantage of the optimal quantum one-time pad based on Pauli operators. To overcome this weakness, they proposed a simple method to ensure the security of the signature. As Choi et al.proved, Bob could not simultaneously forge both the information and the signature to be verified by an arbitrator in the event of a dispute. In the same year, Yang et al. [17] demonstrated how to construct an arbitrated quantum signature protocol for classical messages using untrusted arbitrators. In order to solve the security problems experienced with the AQS protocol, Zhang et al. [18] analyzed the existing security problems [15,16] in 2013 and suggested some corresponding improvement strategies to counter forgery attacks. In order to solve the problem proposed by Gao et al. [15], Liu et al. [19] designed a new QOTP algorithm in 2014, which mainly relies on inserting decoy states into fixed positions, and constructed an unconditionally secure AQS scheme with fast signing and verifying using only a single particle state. In 2015, Li [20] used chained CNOT operation for encryption, instead of quantum one-time pad, to ensure the security of the protocol. To improve the efficiency of quantum bit to 100%, Yang [21] proposed an AQS scheme with the cluster state in 2016. In 2017, in order to resist forgery attacks and disavowal attacks, Zhang et al. [22] proposed a new quantum encryption based on the key-controlled chained CNOT operations (KCCC encryption), and through KCCC encryption, constructed an improved arbitrated quantum signature protocol. In 2016, Yang et al. [23] also proposed a theoretically extensible quantum digital signature with a star-like cluster state. In 2018, Shi et al. [24] proposed an arbitrated quantum signature scheme with the Hamiltonian algorithm based on blind quantum computation. Due to the application of blind quantum computation, it is not necessary to recover the original message during verification, which can improve the simplicity and operability of AQS. In the same year, Feng et al. [25] constructed an AQS scheme based on continuous variable squeezed vacuum states rather than coherent states to further improve coding efficiency and performance. In 2019, Feng et al. [26] proposed an AQS scheme with quantum walk-based teleportation, which does not require the preparation of entangled particles in advance, making the AQS protocol more flexible and practical. In 2020, Chen et al. [27] proposed an offline arbitrated semi-quantum signature scheme based on four-particle cluster states, in which the classical parties can sign with the assistance of a quantum arbitrator. Different from the typical arbitrated quantum signature schemes, the arbitrator in this protocol acts as a relay station of signature transmission and no longer interferes with the direct authentication of the signature, so that the signature receiver has completed authentication rights. There is no additional direct communication between the signatory and the receiver, which reduces the complexity of transmission. However, the above AQS scheme does not consider authentication between signatory, arbitrator, and verifier. Quantum teleportation is a technology that uses the entangled state or cluster state to transmit information between two sides of communication. The first scheme of quantum teleportation was proposed by Bennett et al. [28] in 1993. It is a scheme of teleportation through classical channel and an EPR entangled channel. In 1998, Karlsson and Bourennane [29] proposed controlled quantum teleportation. Its basic idea is that the receiver reconstructs the unknown quantum state with the help of the controller. Until now, quantum teleportation has been studied using the GHZ states [30], W. states [31,32], cluster states [33], and other entangled states as quantum channels. In recent years, many quantum signature schemes have used entangled states as quantum channels, and methods were proposed to transmit unknown quantum states of a single particle [34] or double particles [35]. In 2005, Brown et al. [36] developed a computationally feasible entanglement measurement method based on negative bias transposition criterion, and found highly entangled four-qubit states and five-qubit states by searching. In 2008, Muralidharan and Panigrahi [37] investigated the usefulness of the five-qubit state introduced by Brown et al. [36] for quantum information applications such as quantum teleportation. The results show that this state can be used for perfect teleportation of arbitrary single- and two-qubit systems. In this paper, we construct an arbitrated quantum signature scheme that can verify the identity of participants using five-qubit entangled states as quantum channels and controlled quantum teleportation. The security analysis result shows that our AQS scheme ensures that the signatory Alice cannot disavow, the verifier Bob cannot repudiate, and any illegal attacker can not forge. The proposed scheme uses mutually unbiased bases particles as decoy particles. It applies a pair of function values of symmetric binary polynomials to perform a unitary operation on decoy particles so that eavesdropping detection and identity verification between participants can be performed. In addition, the scheme only needs von Neumann measurement, Bell measurement, and a unitary operation to recover the single-particle qubit state. It replicates message from the signatory Alice to the verifier Bob, which is an attractive advantage for realizing an actual quantum communication network. The scheme has the following advantages: The mutually unbiased bases particles are used as decoy particles to prevent external adversaries from eavesdropping during transmission; The receiver only needs to ask about the position of the decoy particles without asking what the measurement bases are in the process of eavesdropping detection; The scheme provides the function of identity authentication among participants. It uses a pair of function values of symmetric binary polynomials as parameters of the unitary operation, which is used to act on the decoy particles to verify the identity of participants. The rest of this article are organized as follows. In Section 2, the concepts of the arbitrated quantum signature, mutually unbiased bases and controlled quantum teleportation are introduced. In Section 3, the detailed process of the proposed protocol is described. In Section 4 and Section 5, the verifiability analysis and safety analysis are conducted, respectively. Finally, a brief conclusion is provided in Section 6.

2. Preliminaries

In this section, we first briefly review some notions concerning the arbitrated quantum signature scheme and the definition of mutually unbiased bases, which is presented in [38]. Then, we introduce controlled quantum teleportation, which is used in constructing the arbitrated quantum signature scheme. Finally, an example of controlled quantum teleportation is given.

2.1. Some Notions concerning the Arbitrated Quantum Signature

A digital signature scheme is a cryptographic primitive that provides the receiver of a message with assurance about the integrity of the data, and the identity of the sender/signatory. Furthermore, it offers unforgeable and undeniable property. Similarly, the arbitrated signature scheme is a digital signature scheme finished with the help of an arbitrator, who is a disinterested third party trusted to complete a protocol. Here “trusted” means that all people involved in the protocol accept what he says as true and what he does as correct, as well as that he will complete his part of the protocol [14]. The quantum signature is a quantum version of the classical digital signature. ([38]). We suppose that

2.2. Mutually Unbiased Bases

If any two sets of standard orthogonal bases in space is unbiased, then this set is called an unbiased bases set. Additionally, one can find at most mutually unbiased bases if q is an odd prime number. In particular, the computation basis is expressed as , where . In addition to the computation basis, the remaining q groups of unbiased bases can be expressed as , where and represent the number of the mutually unbiased bases and list the number of vectors for the given bases. For these mutually unbiased bases satisfy the following conditions: . Letting , we have following operations: For the convenience of expression, is denoted as which is a unitary operator, that is, . Especially, we have .

2.3. Controlled Quantum Teleportation

Our arbitrated quantum signature scheme is based on controlled quantum teleportation. The five-qubit entangled state can be used to perfect the teleportation of arbitrary single- and two-qubit systems [37], which are suitable for maximum contact teleportation and satisfy the biggest task-oriented definition of entangled state [36]. Due to the above advantages, in this section, we use the five-qubit entangled state as the quantum channel to execute controlled quantum teleportation. The design form is as follows: In the form above, represent the four Bell states of two particles, respectively, and . These states exhibit true multipartite entanglement from both negative bias measurements and von Neumann measurements. Even after tracking one or two qubits from this state, entanglement is maintained in the resulting subsystem, which is therefore highly robust. In the quantum teleportation process, the participants are Alice, Trent, and Bob. Alice owns particles (M, 2, 3), Trent owns particles (1, 4), and Bob owns the particle (5). The model of controlled quantum teleportation is shown in Figure 1.
Figure 1

The model of controlled quantum teleportation.

The working process of the controlled quantum teleportation is described below: Step 1: Alice performs three-particle von Neumann measurements of the particles (M, 2, 3) in her possession. The three-particle von Neumann measurement basis is , as shown in Table 1.
Table 1

The three-particle von Neumann measurement basis.

χ1=12|000+|111 χ2=12|000|111
χ3=12|001+|110 χ4=12|001|110
χ5=12|010+|101 χ6=12|010|101
χ7=12|100+|011 χ8=12|100|011
Suppose Alice carries the information of the quantum state of particle M as , where the coefficients and are unknown and satisfy . The combined state of the entire system consisting of particles M and is given by the formula below. Step 2: Alice conveys her measurement outcomes to Bob through the classical channel. If Alice uses measurement basis to measure , then will collapse into the corresponding states shown in Table 2.
Table 2

The outcomes of Alice’s measuring with measurement basis .

χM231|ΨM12345=14α|100+α|111+β|101+β|110 χM232|ΨM12345=14α|100+α|111β|101β|110
χM233|ΨM12345=14α|000α|011+β|001β|010 χM234|ΨM12345=14α|000α|011β|001+β|010
χM235|ΨM12345=14α|001α|010+β|000β|011 χM236|ΨM12345=14α|001α|010β|000+β|011
χM237|ΨM12345=14α|101+α|110+β|100+β|111 χM238|ΨM12345=14α|101α|110+β|100+β|111
Step 3: Trent uses Bell measurement basis to perform two-particle measurements on particles (1,4). After Trent measures with Bell measurement basis , collapses to the corresponding state shown in Table 3.
Table 3

Outcomes of Trent’s measuring with Bell measurement basis.

|ϕ14+ |ϕ14 |ψ14+ |ψ14
χM231|ΨM12345 α|1+β|05 α|1β|05 α|0+β|15 α|0β|15
χM232|ΨM12345 α|1β|05 α|1+β|05 α|0β|15 α|0+β|15
χM233|ΨM12345 α|0+β|15 α|0+β|15 α|1β|05 α|1β|05
χM234|ΨM12345 α|0β|15 α|0β|15 α|1+β|05 α|1+β|05
χM235|ΨM12345 α|1+β|05 α|1+β|05 α|0β|15 α|0β|15
χM236|ΨM12345 α|1β|05 α|1β|05 α|0+β|15 α|0+β|15
χM237|ΨM12345 α|0+β|15 α|0β|15 α|1+β|05 α|1β|05
χM238|ΨM12345 α|0+β|15 α|0β|15 α|1+β|05 α|1β|05
Step 4: Trent sends his measurement results to Bob through the classical channel. Step 5: Following Trent and Alice’s measurements, Bob performs an appropriate unitary operation and successfully reconstructs the original unknown quantum state on the particle (5). The participants’ measurement outcomes and the unitary operation are shown in Table 4, in which MO represents the measurement outcomes and all the Pauli matrices are shown below.
Table 4

The relationship between Alice’s, Trent’s measurement outcomes, and Bob’s unitary operation.

Alice’ MOTrent’ MOBob’s State U(5) Trent’ MOBob’s State U(5)
χ1=12|000+|111 |ϕ14+ α|1+β|05 σx5 |ψ14+ α|0+β|15 I5
|ϕ14 α|1β|05 σx5 |ψ14 α|0β|15 I5
χ2=12|000|111 |ϕ14+ α|1β|05 iσy5 |ψ14+ α|0β|15 σz5
|ϕ14 α|1+β|05 iσy5 |ψ14 α|0+β|15 σz5
χ3=12|001+|110 |ϕ14+ α|0+β|15 I5 |ψ14+ α|1β|05 σx5
|ϕ14 α|0+β|15 I5 |ψ14 α|1β|05 σx5
χ4=12|001|110 |ϕ14+ α|0β|15 σz5 |ψ14+ α|1+β|05 iσy5
|ϕ14 α|0β|15 σz5 |ψ14 α|1+β|05 iσy5
χ5=12|010+|101 |ϕ14+ α|1+β|05 σx5 |ψ14+ α|0β|15 I5
|ϕ14 α|1+β|05 σx5 |ψ14 α|0β|15 I5
χ6=12|010|101 |ϕ14+ α|1β|05 iσy5 |ψ14+ α|0+β|15 σz5
|ϕ14 α|1β|05 iσy5 |ψ14 α|0+β|15 σz5
χ7=12|100+|011 |ϕ14+ α|0+β|15 I5 |ψ14+ α|1+β|05 σx5
|ϕ14 α|0β|15 I5 |ψ14 α|1β|05 σx5
χ8=12|100|011 |ϕ14+ α|0+β|15 σz5 |ψ14+ α|1+β|05 iσy5
|ϕ14 α|0β|15 σz5 |ψ14 α|1β|05 iσy5
Based on Alice and Trent’s measurement outcomes, Bod performs the corresponding unitary operation on particle (5) and his result is . This is the original information particle state. That is, Alice successfully transmits the unknown quantum state to Bob under Trent’s control. Suppose that the information particle states are

3. The Proposed Verifiable Arbitrated Quantum Signature Scheme

In our scheme, Alice the signatory, Bob the verifier, and Trent the arbitrator are defined as the three participants. The arbitrator Trent should be trusted by both Alice and Bob. The detailed procedures of our scheme can be described as follows.

3.1. Initializing Phase

Step I1: Alice and Trent share secret key and Bob and Trent share secret key . The secret key distribution task can be performed using the QKD protocol, which has been proven to provide unconditional security [39,40]. Step I2: Trent selects a -order symmetric binary polynomial: mod q, where q is a prime number, , , , , is a finite field. Suppose that the public identity information for the participants Alice, Bob, and Trent is . Trent computes two share polynomials and . The share polynomial is encrypted as and is sent to Alice. The share polynomial is encrypted as and is sent to Bob. Step I3: Alice receives and decrypts it with secret key to obtain . Alice calculates and based on Bob’s and Trent’s public identity information and . Similarly, Bob can calculate and based on Alice’s and Trent’s public identity information and . Due to the symmetry of the binary polynomial, , , . Step I4: According to the value of and , Alice executes the unitary operations and on to produce enough decoy particles: and . The parameter formation process of the initializing phase is shown in Figure 2.
Figure 2

Initializing phase schematic diagram.

3.2. Signing Phase

Step S1: Alice obtains a qubit string based on the signature information m. Suppose there are n qubits in the information qubit string , ⋯, , where the symbol represents the collection and represents a single qubit in . Any qubit in can be represented as a superposition of two eigenstates and , namely, , where are complex numbers that satisfy . Thus, the signed quantum information string of Alice can be represented as . Note that if the signature quantum state is known, any copies of can be prepared in advance. If the signature quantum state is unknown, at least three copies of are necessary, among which one is combined with 5-particle entangled state, one produces a secret qubit string , and the other is sent to Bob. Step S2: Alice transforms the information qubit string into a secret qubit string in terms of the secret key . This transform method can be seen in [14]. Step S3: Alice prepares 5-particle entangled states. Alice combines each information qubit with 5-particle entangled state into the same long 6-particle qubit string. Each combinatorial state includes one information particle and five entangled particle. This 6-particle combination state can be described as follows: Step S4: Alice uses to represent the sequence of n (M, 2, 3) particles, where M represents the information particle to be signed. represents the sequence of n (1, 4) particles, and represents the sequence of n (5) particles. The decoy particles and are randomly inserted in and to form and , respectively. Alice sends to Trent and to Bob. Step S5: Alice performs von Neumann measurement on the particle sequence that she has mastered. Suppose the n-group von Neumann measurement results are , where . Alice encrypts and to form the signature by using quantum one-time pad algorithm [41]. Note that , even if sometimes described as classical bits, can be converted to qubits from the measurement basis . Alice sends the signature and 2 information qubit strings to Bob.

3.3. Verification Phase

Step V1: After confirming that Bob received , Alice tells Bob the position of the decoy particles and Bob executes the unitary operation on the decoy particle , that is, . Then, Bob measures the decoy particles using measurement basis  . If , it implies that the identity authentication between Alice and Bob cannot be passed or the decoy particle have been eavesdropped. Finally, Bob calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step. Otherwise, the execution of the protocol is aborted. After Bob passes the eavesdropping detection and identity authentication of , the decoy particles are removed and is restored. Similarly, after confirming that Trent received , Alice tells Trent the position of the decoy particles and then Trent executes the unitary operations on the decoy particle , that is, . Then Trent measures the decoy particles using the measurement basis . If , it indicates that the identity authentication between Alice and Trent cannot be passed or that the particles are eavesdropped. Finally, Trent calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step; otherwise, they abandon the agreement. After Trent performs the eavesdropping detection and identity authentication on , the decoy particles are removed and is restored. Step V2: After Bob receives which was sent by Alice, he encrypts and with the secret key to obtain . Bob sends to Trent via a quantum channel. Step V3: After receiving , Trent decrypts it using secret key to obtain and , and decrypts using secret key to obtain and . In the meantime, Trent measures with measurement basis to obtain the measurement outcome . Trent uses the secret key to transform the information qubit string into and compare with . If , Trent sets the initial check parameter ; otherwise, he sets . Note that this step and the subsequent comparison of the quantum states can be found in [14,42]. To ensure the integrity of the signature, Trent selects an appropriate hash function and calculates . Step V4: Trent encryptions , , , , with secret key and sends , to Bob. Step V5: Bob decrypts to obtain , , , and . If , Bob can assume that the signature was forged, he rejects the signature and exits the verification process; otherwise, Bob continues with the next verification process. Step V6: According to the values of and , Bob chooses the corresponding unitary operator in Table 4. Bob performs unitary operation on the particles in sequence and measures them to obtain the quantum state . Notice that is the result of executing controlled quantum teleportation. Then, he compares whether it is equal to . If , Bob considers the signature invalid and rejects it. If , Bob calculates with the same hash function and compares with . If , Bob accepts as the signature of from Alice; otherwise, the signature is rejected. The schematic diagram of the main steps of the arbitrated quantum signature scheme is shown in Figure 3.
Figure 3

Schematic diagram of the main steps of the arbitrated quantum signature scheme.

4. Verifiability Analysis

We can prove that, in this scheme, identity authentication and eavesdropping detection can be conducted between Alice and Bob as well as between Alice and Trent according to the measurement outcomes of the decoy particles. An example for the proposed verifiable arbitrated quantum signature scheme can be seen in Appendix A. In steps I3 and I4, according to Alice’s share polynomial and Bob’s publicly identified information , Alice calculates and creates decoy particles According to Bob’s share polynomial and Alice’s publicly identified information , Bob calculates . In step V1, after Bob receives , he performs the unitary operation on , that is . According to the properties of symmetric binary polynomials, we have and . Without external eavesdropping and cheating on either side, Bob’s measurement outcomes of the decoy particles should be ; otherwise, it can be determined that either identity cheating on both sides or external eavesdropping are occurring. Therefore, Alice and Bob can verify whether identity cheating is occurring according to the measurement outcomes of the decoy particles. Similarly, identity verification and eavesdropping detection can also be conducted between Alice and Trent according to the measurement outcomes of the decoy particles.

5. Safety Analysis

A secure quantum signature scheme should be of an unforgeable and undeniable property. In other words, it should meet the following requirements: (1) The signature cannot be forged by an attacker (including external adversary Eve and malicious receiver Bob). (2) The signatory Alice cannot disavow the message and signature she sent, and the receiver Bob cannot disavow that he received the signature. (3) That can be arbitrated if the receiver Bob admits the fact of receiving the signature but disavows the integrity of the signature.

5.1. Impossibility of Forgery

If the external attacker Eve tries to forge Alice’s signature for her own benefit, she should know the key . However, due to the unconditional security of quantum key distribution [39,40], this is not possible. In addition, the quantum one-time pad protocol [41] is used to improve the security. Therefore, Eve’s forgery is impossible. If the malicious receiver Bob tries to forge Alice’s signature for his own benefit, he must also know Alice’s secret key . However, for the same reason, he cannot obtain any information about the key . Thus, Bob cannot obtain the correct . Subsequently, the initial check parameter used in the verifying phase will not be right, so the arbitrator Trent will discover this forgery. In a worse case, even if key is exposed to Eve, she still cannot forge the signature because she cannot create the appropriate and to associate with the new message. Bob uses the correlation of the Bell state to find this kind of forged file; further verification of cannot be established without the correct . However, if Bob knew the secret key , forgery would be inevitable. We can prove that Eve, an external attacker, cannot entangle a decoy particle or an information particle with an auxiliary particle to steal secret information and forge a signature. See Appendix B for details.

5.2. Impossibility of Disavowal by the Signatory and the Verifier

A secure quantum signature scheme should have undeniable property. In other words, once the quantum signature is verified as a valid signature, the signatory cannot disavow the fact that the quantum signature is generated by them. The receiver of the signature cannot disavow the fact that he has received the quantum signature.

5.2.1. Impossibility of Disavowal by the Signatory Alice

Suppose Alice tries to disavow the signature that she has signed. As shown in Figure 4, after receiving the signature , Bob cannot decrypt it without the key . He can only encrypt and to obtain and sends to Trent. After receiving , the arbitrator Trent decrypts and with and . As the signature contains the key shared only by Alice and Trent, Trent can accurately confirm that the signature was signed by Alice. Whether is the signature of the message is determined by the initial check parameter calculated by the arbitrator Trent. Because , , if , namely , then the signature was signed by Alice for the message .
Figure 4

Diagram of transferring signature information.

5.2.2. Impossibility of Disavowal by the Verifier Bob

Similarly, as long as Trent receives the sent from Bob, because contains the key shared only by Bob and Trent, Trent can confirm that Bob received the signature and cannot change it, that is, Bob cannot disavow the fact that he received the signature. If Alice changes signature to , her behavior will be found when Bob calculates hash value and compares it with . If Bob admits to receiving the signature, but disavows the integrity of the signature, it can be arbitrated according to the hash value of . In this scheme, the eavesdropping detection also functions as identity authentication, which can strengthen the undeniable property of Alice and Bob. In conclusion, our verifiable arbitrated quantum signature scheme has undeniable security.

6. Conclusions

In this paper, we proposed a verifiable arbitrated quantum signature scheme based on five-qubit entangled state. The proposed scheme uses mutually unbiased bases particles as decoy particles, and performs unitary operations on these decoy particles using the function values of symmetric binary polynomials, which can carry out not only eavesdropping detection, but also identity authentication among participants. Due to the unconditional security of quantum key distribution and the quantum one-time pad, the external attacker Eve cannot know Alice’s key ; she cannot forge Alice’s signature for her own benefit. For the same reason, Bob cannot forge Alice’s signature , either. In order to avoid Alice’s disavowal, we set that when Trent receives Alice’s signature , the hash function value of the signature is calculated to ensure the integrity of the signature. After Trent receives and decrypts and , the initial check parameter confirms that is jointly generated by and , which proves that Alice did not cheat. At this time, since Trent had no information on parameter , he could not forge a new signature. After Bob receives and decrypts it, as the information of and are in his grasp at this time, he can use the function of quantum teleportation to reconstruct the information qubit to judge whether to accept the quantum signature signed by Alice. Different from the signature scheme in classical cryptography, the security of our scheme is guaranteed by the quantum one-time pad [41] and quantum key distribution [39,40]. Therefore, it is unconditionally secure. The five-qubit entangled state plays a key role in quantum information processing tasks and it is the threshold number of qubits required for quantum error correction [43]. The principle of five-photon entanglement and open teleportation was reported in [44] and proved that von Neumann measurement, Bell measurement, and single-particle measurement are all feasible under the current technical and experimental conditions, so the scheme has good application value. Compared with the existing arbitrated quantum signature scheme [10,13,14,17,27], our scheme has high stability and can avoid being disavowed for the integrality of signature . But due to the large number of qubits used in the scheme, it also experiences the problem of low quantum efficiency.
Table A1

The 6-particle qubit string composed of information states and 5-particle entangled states.

|Ψ1M12345=|γ1M|ξ12345=|0M|ξ12345=12(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345
|Ψ2M12345=|γ2M|ξ12345=|1M|ξ12345=12(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ3M12345=|γ3M|ξ12345=|+M|ξ12345=122(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345 +122(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ4M12345=|γ4M|ξ12345=|M|ξ12345=122(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345 122(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ5M12345=|γ5M|ξ12345=|+M|ξ12345=122(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345 +122(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ6M12345=|γ6M|ξ12345=|0M|ξ12345=12(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345
|Ψ7M12345=|γ7M|ξ12345=|M|ξ12345=122(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345 122(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ8M12345=|γ8M|ξ12345=|1M|ξ12345=12(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ9M12345=|γ9M|ξ12345=|1M|ξ12345=12(|1001|ϕ+|1010|ψ+|1100|ϕ++|1111|ψ+)M12345
|Ψ10M12345=|γ10M|ξ12345=|0M|ξ12345=12(|0001|ϕ+|0010|ψ+|0100|ϕ++|0111|ψ+)M12345
  11 in total

1.  Unconditional security of quantum key distribution over arbitrarily long distances

Authors: 
Journal:  Science       Date:  1999-03-26       Impact factor: 47.728

2.  Quantum fingerprinting.

Authors:  H Buhrman; R Cleve; J Watrous; R de Wolf
Journal:  Phys Rev Lett       Date:  2001-09-26       Impact factor: 9.161

3.  Simple proof of security of the BB84 quantum key distribution protocol

Authors: 
Journal:  Phys Rev Lett       Date:  2000-07-10       Impact factor: 9.161

4.  Experimental demonstration of five-photon entanglement and open-destination teleportation.

Authors:  Zhi Zhao; Yu-Ao Chen; An-Ning Zhang; Tao Yang; Hans J Briegel; Jian-Wei Pan
Journal:  Nature       Date:  2004-07-01       Impact factor: 49.962

5.  Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.

Authors: 
Journal:  Phys Rev Lett       Date:  1993-03-29       Impact factor: 9.161

6.  Mixed-state entanglement and quantum error correction.

Authors: 
Journal:  Phys Rev A       Date:  1996-11       Impact factor: 3.140

7.  Measurement-device-independent quantum key distribution via quantum blockade.

Authors:  Yi-Heng Zhou; Zong-Wen Yu; Ao Li; Xiao-Long Hu; Cong Jiang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2018-03-07       Impact factor: 4.379

8.  A New Quantum Blind Signature Scheme with BB84-State.

Authors:  Feng-Lin Chen; Zhi-Hua Wang; Yong-Mo Hu
Journal:  Entropy (Basel)       Date:  2019-03-28       Impact factor: 2.524

9.  Deterministic Secure Quantum Communication on the BB84 System.

Authors:  Youn-Chang Jeong; Se-Wan Ji; Changho Hong; Hee Su Park; Jingak Jang
Journal:  Entropy (Basel)       Date:  2020-11-07       Impact factor: 2.524

10.  An Attack on Zawadzki's Quantum Authentication Scheme.

Authors:  Carlos E González-Guillén; María Isabel González Vasco; Floyd Johnson; Ángel L Pérez Del Pozo
Journal:  Entropy (Basel)       Date:  2021-03-25       Impact factor: 2.524

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.