A preview of this full-text is provided by Springer Nature.
Content available from Quantum Information Processing
This content is subject to copyright. Terms and conditions apply.
Quantum Information Processing (2024) 23:49
https://doi.org/10.1007/s11128-024-04257-5
Secure quantum signature scheme without entangled state
Tianyuan Zhang1·Xiangjun Xin1·Lei Sun2·Chaoyang Li1·Fagen Li3
Received: 26 June 2023 / Accepted: 1 January 2024 / Published online: 6 February 2024
© The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024
Abstract
The security of most quantum signatures cannot be proved with security model under
chosen-message attack. No formal proof can prove that their security is fully dependent
on the basic quantum theory. Based on the orthogonal quantum state and key-controlled
quantum hash function, an arbitrated quantum signature is proposed. In this scheme,
the signatory produces the quantum signature by quantum-encrypting the output of
key-controlled quantum hash function. The signature verification is performed by
decrypting the signed message and comparing the decrypted message with the output
of the key-controlled quantum hash function. The security of the proposed scheme
depends on the indistinguishability of the unknown quantum sequence. Its unforge-
ability can be formally proved with security model under chosen-message attack.
Therefore, its security can be supported by the formal proof. On the other hand, in the
proposed scheme, no entangled state is used. It also has better qubit efficiency as well.
Keywords Quantum signature ·Security ·Security model ·Chosen-message attack ·
Unforgeability ·Eavesdropping
1 Introduction
With the gradual advancement of digitalization in today’s life, more and more messages
need to be authenticated. That is, the receiver has to figure out the source of messages
and checks whether they have been disturbed or eavesdropped or neither. To ensure the
confidentiality and integrity of a message, Diffie et al. presented the theory of digital
signature [1]. The signature generation process is essentially that the signer encrypts
BXiangjun Xin
xin_xiang_jun@126.com
1College of Software Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002,
China
2School of Mathematics and Physics, Yancheng Institute of Technology, Yancheng 224051, China
3School of Computer Science and Engineering, University of Electronic Science and Technology of
China, Chengdu 611731, China
123
Content courtesy of Springer Nature, terms of use apply. Rights reserved.