ArticlePublisher preview available

Quantum Designated Multi- verifier Signature

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract and Figures

A quantum designated multi- verifier signature (QDMVS) scheme is proposed. In this scheme, the signer can simultaneously designate multiple verifiers to verify the validity of the signature; the signature’s validity can be verified if and only if all the designated verifiers involve in the verification process. Moreover, all the verifiers can work together to generate an indistinguishable signature from the signer, so any third party can not confirm whether the signer or all the verifiers signed the original message. Security analysis shows that our QDMVS scheme is resistant to various attacks. On top of that, our scheme does not need any trusted third party, quantum one- way functions (QOWF), or quantum state swapping tests (SWAP). Therefore, the proposed QDMVS scheme is more efficient than similar schemes.
This content is subject to copyright. Terms and conditions apply.
Vol.:(0123456789)
International Journal of Theoretical Physics (2024) 63:11
https://doi.org/10.1007/s10773-023-05534-2
1 3
RESEARCH
Quantum Designated Multi‑ verifier Signature
LingZhang1· Jia‑HaoZhang1· Xiang‑JunXin1· MinHuang1· Chao‑YangLi1
Received: 22 October 2023 / Accepted: 20 December 2023 / Published online: 9 January 2024
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024
Abstract
A quantum designated multi- verifier signature (QDMVS) scheme is proposed. In this
scheme, the signer can simultaneously designate multiple verifiers to verify the validity
of the signature; the signature’s validity can be verified if and only if all the designated
verifiers involve in the verification process. Moreover, all the verifiers can work together to
generate an indistinguishable signature from the signer, so any third party can not confirm
whether the signer or all the verifiers signed the original message. Security analysis shows
that our QDMVS scheme is resistant to various attacks. On top of that, our scheme does
not need any trusted third party, quantum one- way functions (QOWF), or quantum state
swapping tests (SWAP). Therefore, the proposed QDMVS scheme is more efficient than
similar schemes.
Keywords Designated multi- verifier· Quantum signature· Quantum designated signature
1 Introduction
Digital signature [1] is an important cryptography primitive that can ensure the integrity
and authenticity of the original message. Traditional digital signatures can be seen as the
applications of public key cryptography, i.e., anyone can use the signer’s public key to
verify his/her signatures. However, in some special scenarios, the privacy of the signer is
not well protected with public verification. For example, in e- voting, e- auctions, and fair
exchanges, it is necessary to preserve the privacy of the signer, while the public key digital
signature is unsatisfied, because the verifier can verify the signer’s signature and convince
others to believe that the signer generated the signature.
Fortunately, the designated verifier signature (DVS) was proposed by Jakobsson etal.
in [2], and the DVS can hide the signature’s source to protect the signer’s privacy. In [2],
the designated multi- verifier signature scheme (DMVS) was also discussed. The concept
* Ling Zhang
ll790217@163.com
* Jia-Hao Zhang
1103803372@qq.com
* Min Huang
1652489138@qq.com
1 Zhengzhou University ofLight Industry, Zhengzhou, China
Content courtesy of Springer Nature, terms of use apply. Rights reserved.
Article
Full-text available
This paper presents a quantum image secret sharing scheme based on designated multi‐verifier signature. First, kk share images are generated by a 2D hyperchaotic system incorporating sinusoidal mapping, Henon mapping, and Cubic mapping using the cascade modulation method. Quantum Arnold scrambling and diffusion are performed on the secret image. Subsequently, the concept of designated multi‐verifier signature is introduced. In the secret image sharing phase, the pixel values of the share images are used to sign the secret image, and the signed secret image and kk share images are sent to a trusted third party and kk designated verifiers, respectively. In this scheme, no carrier images are required, and the share images held by the participants do not contain any information about the secret image. Finally, simulation experiments and security analysis are conducted on IBM Qiskit platform and Matlab software.
Article
Full-text available
Based on a set of locally indistinguishable orthogonal product (LIOP) states, a quantum designated multi-verifier signature scheme (LIOP-QDMVS) is proposed. In this scheme, each verifier can independently verify partial signature without exchanging information with other verifiers. The protocol can address the issue of excessive power from individual verifiers, as the signature is accepted as valid only when all verifiers confirm its validity. Additionally, all designated verifiers can collaborate to simulate signatures from the signer, that achieve the non-transferability and source hiding of the protocol. Furthermore, the scheme does not require any third-party involvement, and no entangled states need to be prepared during signature generation. It is proven that the LIOP-QDMVS owns unforgeability, correctness, theoretical information security, and designated verifier properties, as well as it is resistant to replay attacks and impersonation attacks. Therefore, LIOP-QDMVS offers better security and efficiency.
Article
Full-text available
Based on GHZGHZ-like state, a semi- quantum designated verifier signature scheme (SQDVS) is proposed, which can be applied in E- bidding, software licensing, and E- voting. In this scheme, according to the measurement results of GHZGHZ-like state with Z bases, the signer encrypts the classic original message to obtain the designated verifier signature. The designated verifier (DV) chooses certain unitary operations, then he/she recovers the original message by measuring GHZGHZ-like state particles with Bell bases and verifies the signature. For the first time, a semi- quantum participant is involved, our designated verifier signature scheme can relatively reduce the cost of the signer’s signature. There are no quantum state swapping tests or one- way quantum functions in our scheme, which can simplify the scheme’s complexity and increase the efficiency of the signature. Meanwhile, because the third party is semi- trusted, timestamps and identity information are used to resolve disputes; furthermore, our SQDVS scheme can resist various attacks. In conclusion, our scheme has lower costs, higher efficiency, and more security than similar schemes.
Article
Full-text available
Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding using DVS attributes to protect the secret of participants. Most traditional DVS schemes are vulnerable to quantum computer attacks. Then, an identity-based semi-trusted third-party quantum DVS (STQDVS) scheme is proposed, which is safe for quantum means of attack. In the new STQDVS scheme, the third participant prepares entangled Bell states and allocates them to the signer and the designated verifier (DV). The signer uses the identity information as her public key and the measurement results of corresponding quantum sequences as her private key to generate the signature. The DV applies the identity information as his public key and the measurement results of corresponding quantum sequences as her private key to verify the signature. Non-transferability and hidden origin are guaranteed by the fact that the DV can generate the same signature as the signatory by means of a simulated signature step. Security analysis has shown that attacks such as forgery, inter-resending, and impersonation are ineffective for the proposed scheme and that even third-party cannot forge signatures. On the other hand, the whole process of the scheme does not require any quantum key distribution protocols, quantum one-way functions, and quantum state exchange tests, which makes the STQDVS scheme relatively simple and more efficient than similar schemes.
Article
Full-text available
Based on the single-qubit rotations, a quantum public-key designated verifier signature (DVS) is proposed. In this scheme, a rotation vector is employed as the signatory’s secret key, and its corresponding quantum sequence is used as the public key. A quantum Diffie–Hellman key can be shared by the signatory and the designated verifier from their quantum public keys. The signatory encrypts the message string into some non-orthogonal particles and performs NOT operations on the quantum Diffie–Hellman key according to the message digest. After these steps, the quantum signature is generated. None but the designed partner can finish verifying of the received quantum signature. The proposed DVS has some other security properties such as source non-traceability and non-transferability. Its unforgeability can be guaranteed by the basic principle of the quantum mechanics. Furthermore, there is not any arbitrator in this DVS scheme. The verifier can finish verifying the signature without the help of any third party. Therefore, it is impossible for the arbitrator to become a bottleneck in the network. Our scheme is the first quantum DVS scheme based on asymmetric quantum public-key system.
Article
Full-text available
Quantum dual-signature means that two signed quantum messages are combined and expected to be sent to two different recipients. A quantum signature requires the cooperation of two verifiers to complete the whole verification process. As an important quantum signature aspect, the trusted third party is introduced to the current protocols, which affects the practicability of the quantum signature protocols. In this paper, we propose a quantum dual-signature protocol without arbitrator and entanglement for the first time. In the proposed protocol, two independent verifiers are introduced, here they may be dishonest but not collaborate. Furthermore, strongly nonlocal orthogonal product states are used to preserve the protocol security, i.e., no one can deny or forge a valid signature, even though some of them conspired. Compared with existing quantum signature protocols, this protocol does not require a trusted third party and entanglement resources.
Article
Full-text available
Although most of the quantum signatures can be verified by a designated receiver, they do not match the classical designated verifier signature since an indistinguishable signature cannot be efficiently simulated. To adapt quantum signatures in specific environments like E-voting and E-bidding, several quantum designated verifier signature (QDVS) schemes have been proposed. However, it is still too complicated and infeasible to implement existing QDVS schemes in practice. In this paper, we propose a practical QDVS scheme without entanglement for E-voting applications. It only involves the quantum processing part of the underlying quantum key distribution (QKD) to generate correlated key strings, which protects the communication against potential eavesdroppers. The proposed scheme can be easily and efficiently deployed over the existing QKD network without complicated quantum operations. We further show that our QDVS scheme satisfies the required main security requirements and has the capability against several common attacks.
Article
Full-text available
Fog computing is viewed as an extended technique of cloud computing. In Internet of things–based collaborative fog computing systems, a fog node aggregating lots of data from Internet of things devices has to transmit the information to distributed cloud servers that will collaboratively verify it based on some predefined auditing policy. However, compromised fog nodes controlled by an adversary might inject bogus data to cheat or confuse remote servers. It also causes the waste of communication and computation resources. To further control the lifetime of signing capability for fog nodes, an appropriate mechanism is crucial. In this article, the author proposes a time-constrained strong multi-designated verifier signature scheme to meet the above requirement. In particular, a conventional non-delegatable strong multi-designated verifier signature scheme with low computation is first given. Based on its constructions, we show how to transform it into a time-constrained variant. The unforgeability of the proposed schemes is formally proved based on the famous elliptic curve discrete logarithm assumption. The security requirement of strong signer ambiguity for our substantial constructions is also analyzed by utilizing the intractable assumption of decisional Diffie–Hellman. Moreover, some comparisons in terms of the signature size and computational costs for involved entities among related mechanisms are made.
Article
Full-text available
Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately, their protocol cannot resist against the forgery attack and disavowal attack. We investigate the security of Jiang et al.’s quantum multi-signature protocol and demonstrate the signature receiver’s forgery attack. What is more, the signature receiver can extend the forgery attack such that anyone can generate the forgery. On the other hand, their protocol is insecure against the signers’ disavowal attack, too. Then, an improved quantum multi-signature protocol is proposed. In the improved protocol, all the signers share the private keys with the signature receiver and the arbitrator. To generate a quantum multi-signature, all the signers perform the unitary operations controlled by the private keys and the message. The improved protocol overcomes all the security drawbacks of Jiang et al.’s quantum multi-signature. What is more, the arbitrator Trent can be semi-trusted, because he cannot forge any quantum signature of the signers, although Trent shares the private keys with all the signers. At the same time, the new protocol has the same quantum efficiency as that of Jiang et al.’s protocol.
Article
Most of the classical designated verifier signature schemes are insecure against quantum adversary. In this paper, a quantum signature scheme for the designated verifier is proposed. In our scheme, during the initialization phase, the partners share secret keys by performing the quantum key distribution protocol. On the other hand, by performing the quantum direct communication protocol, the key generator center shares secret keys with the signer and the designated verifier, respectively. The key generator center generates a particle sequence of Bell state and distributes the particles between the signer and the designated verifier. During the signature generation phase, the signer encrypts the particle sequence by the secret keys and Hardmard operators. After that, the signer performs the controlled unitary operations on the encrypted particle sequence so as to generate the quantum signature. The designated verifier can simulate the quantum signature by performing the same symmetric signing steps as that performed by the original signer. Hence, the quantum signature signed by the true signer is the same as the one simulated by the receiver, which makes our scheme possess the designated properties. During the signature verification phase, the designated verifier performs the controlled unitary operations on the quantum signature and obtains the quantum ciphertexts. After that, the designated verifier decrypts the quantum ciphertexts by the symmetric secret keys and Hardmard operators so that the quantum signature can be verified. Our signature is secure against forgery attack, inter-resending attacks and Trojan horse attack. Because the trace distance between the density operators of different quantum signatures is zero, the information-theoretical security of our quantum signature scheme can be proved. The unconditionally secure quantum key distribution protocol and the one-time pad encryption algorithm can guarantee the security of the secret keys shared by the partners. What is more, the security assumption about the key generation center is weak. That is, it is not necessary to assume that the key generation center should be fully trusted. On the other hand, in our scheme, the quantum one-way function is not used. To generate a quantum signature, the signer need not prepare for entangled particle sequence. To verify a quantum signature, the verifier need not apply any state comparison to the received particles. The qubit efficiency is 100%. Therefore, our scheme has the advantages in the security and efficiency over the other quantum signature schemes for the designated verifier.