Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party

View through CrossRef
Abstract Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding use DVS attributes to protect the secret of participants. Most traditional DVS schemes are vulnerable to quantum computer attacks. Then, an identity-based semi-trusted third-party quantum DVS (STQDVS) scheme is proposed, which is safe for quantum means of attack. In new STQDVS scheme, the third participant prepares entangled Bell states and allocates them to the signer and the designated verifier (DV). The signer uses the identity information as her public key and the measurement results of corresponding quantum sequences as her private key to generate the signature. The DV applies the identity information as his public key and the measurement results of corresponding quantum sequences as her private key to verify the signature. Non-transferability and hidden origin are guaranteed by the fact that the DV can generate the same signature as the signatory by means of a simulated signature step. Security analysis has shown that attacks such as forgery, inter-resending, and impersonation are ineffective for the proposed scheme and that even third-party cannot forge signatures. On the other hand, the whole process of the scheme does not require any quantum key distribution protocols, quantum one-way functions, and quantum state exchange tests, which makes the STQDVS scheme relatively simple and more efficient than similar schemes.
Springer Science and Business Media LLC
Title: Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party
Description:
Abstract Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding use DVS attributes to protect the secret of participants.
Most traditional DVS schemes are vulnerable to quantum computer attacks.
Then, an identity-based semi-trusted third-party quantum DVS (STQDVS) scheme is proposed, which is safe for quantum means of attack.
In new STQDVS scheme, the third participant prepares entangled Bell states and allocates them to the signer and the designated verifier (DV).
The signer uses the identity information as her public key and the measurement results of corresponding quantum sequences as her private key to generate the signature.
The DV applies the identity information as his public key and the measurement results of corresponding quantum sequences as her private key to verify the signature.
Non-transferability and hidden origin are guaranteed by the fact that the DV can generate the same signature as the signatory by means of a simulated signature step.
Security analysis has shown that attacks such as forgery, inter-resending, and impersonation are ineffective for the proposed scheme and that even third-party cannot forge signatures.
On the other hand, the whole process of the scheme does not require any quantum key distribution protocols, quantum one-way functions, and quantum state exchange tests, which makes the STQDVS scheme relatively simple and more efficient than similar schemes.

Related Results

Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...
Advancements in Quantum Computing and Information Science
Advancements in Quantum Computing and Information Science
Abstract: The chapter "Advancements in Quantum Computing and Information Science" explores the fundamental principles, historical development, and modern applications of quantum co...
Integrating quantum neural networks with machine learning algorithms for optimizing healthcare diagnostics and treatment outcomes
Integrating quantum neural networks with machine learning algorithms for optimizing healthcare diagnostics and treatment outcomes
The rapid advancements in artificial intelligence (AI) and quantum computing have catalyzed an unprecedented shift in the methodologies utilized for healthcare diagnostics and trea...
Quantum information outside quantum information
Quantum information outside quantum information
Quantum theory, as counter-intuitive as a theory can get, has turned out to make predictions of the physical world that match observations so precisely that it has been described a...
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
The advent of quantum computing has introduced significant potential to revolutionize healthcare through quantum neural networks (QNNs), offering unprecedented capabilities in proc...
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
A Novel Method for Developing Post-quantum Digital Signature Algorithms on Non-commutative Associative Algebras
Introduction: Development of practical post-quantum signature algorithms is a current challenge in the area of cryptography. Recently, several candidates on post-quantum signature ...
Quantum metamaterials: Applications in quantum information science
Quantum metamaterials: Applications in quantum information science
Metamaterials are a class of artificially engineered materials with periodic structures possessing exceptional properties not found in conventional materials. This definition can b...
Quantum Communication and Cybersecurity
Quantum Communication and Cybersecurity
Abstract: This book presents a comprehensive and interdisciplinary examination of the convergence between quantum information science and cybersecurity. It addresses the foundation...

Back to Top