2011
DOI: 10.1103/physreva.84.022344
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of the arbitrated quantum signature protocols

Abstract: As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in these protocols the receiver Bob can realize existential forgery of the sender's signature under known message attack. Bob can even achieve universal forgery when the protocols are used to sign a classical message. Furthermore, the sender Alice can successfully disavo… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
109
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 159 publications
(109 citation statements)
references
References 41 publications
0
109
0
Order By: Relevance
“…In fact, it is impossible to sign a quantum message [15] using a nonarbitrated scheme [16]. Arbitrated signing of quantum messages has previously been investigated [17][18][19][20].Since messages may be forwarded between recipients, a signature protocol has at least three parties, a sender Alice and two recipients, Bob and Charlie. In QKD, the communicating parties Alice and Bob are assumed to be honest.…”
mentioning
confidence: 99%
“…In fact, it is impossible to sign a quantum message [15] using a nonarbitrated scheme [16]. Arbitrated signing of quantum messages has previously been investigated [17][18][19][20].Since messages may be forwarded between recipients, a signature protocol has at least three parties, a sender Alice and two recipients, Bob and Charlie. In QKD, the communicating parties Alice and Bob are assumed to be honest.…”
mentioning
confidence: 99%
“…Whether these countermeasures can overcome all the security problems discovered in Refs. [7][8][9][10] and how to design an AQS scheme which can withstand existing or potential attacks deserve further research.…”
Section: Discussionmentioning
confidence: 99%
“…[15], breaking cryptosystems is as important as building them. During the study of quantum cryptography, lots of effective attack strategies have been presented, and then the corresponding defending methods have been put forward [16][17][18][19][20][21][22][23][24][25][26][27][28][29]. In this way, the refinement of quantum cryptography protocol is achieved.…”
Section: Introductionmentioning
confidence: 99%