量子电子学报

• 量子光学 • 上一篇    下一篇

基于量子纠缠交换的双重弱盲签名方案

娄小平1,2,唐文胜1*,马华1   

  1. 1湖南师范大学 信息科学与工程学院,湖南 长沙 410081; 2洞庭湖生态经济区建设与发展湖南省协同创新中心,湖南 常德 415000
  • 出版日期:2019-03-28 发布日期:2019-03-20
  • 通讯作者: 唐文胜 E-mail:tangws@hunnu.edu.cn
  • 作者简介:娄小平(1982-),女,湖南湘潭人,博士研究生,副教授,硕士生导师,主要从事量子密码方面的研究。E-mail:louxiaoping@foxmail.com
  • 基金资助:
    Supported by National Natural Science Foundation of China (国家自然科学基金青年项目,61602172) Natural Science Foundation of Hunan Province of China (湖南省自然科学基金青年项目, 2017JJ3223), Science and technology project of Hunan province department of education (湖南省教育厅科学研究优秀青年项目,16B179)

A dual weak blind signature based on quantum entanglement swapping

Xiaoping Lou1,2, Wensheng Tang1*, Hua Ma1   

  1. 1 College of Information Science and Engineering, Hunan Normal University, Changsha 410081, China; 2Hunan Province Cooperative Innovation Center for The Construction and Development of Dongting Lake Ecological Economic Zone, Changde 415000, China
  • Published:2019-03-28 Online:2019-03-20

摘要: 为了抵御弱盲签名的伪造攻击,在量子一次一密的基础上,基于量子纠缠交换原理提出了双重弱盲签名方案。方案由发送者、签名者和验证者三方经过初始化、消息盲化、双重盲签名和验证四个步骤完成。发送者将消息盲化后送给签名者,签名者用量子可控非门产生盲签名并执行Bell态测量,发送者用量子测量对原始消息再次签名,验证者对两次签名分别验证,并去除盲化恢复原始消息。如果参与者对签名验证的结果有争议,由可信的签名者对争议进行仲裁。分析表明,当密钥满足偶数位恒为1时,该方法不仅能抵御外部攻击,而且能有效防止发送者篡改,满足了弱盲签名的不可伪造性、不可否认性、盲性和可追踪性等要求。本方案在电子商务、电子货币等互联网交易中具有广泛的应用前景。

关键词: 量子光学, 弱盲签名, 量子纠缠, Bell态, 纠缠交换

Abstract: In order to resist the forgery attack of weak blind signature, a double weak blind signature scheme is proposed based on the quantum entanglement exchange principle. The scheme is completed by initializing, message blindness, double blind signature and verification by the sender, signer and verifier. Sender send message after the blind to the signer, the signer with quantum controlled not gate to produce blind signature and perform the Bell state measurement, the sender with quantum measurement of the original message signature again, to be checked twice signature verification respectively, and remove blind to restore the original message. If a participant disputes the results of the signature verification, the trusted signer will arbitrate the dispute. Analysis shows that when the key to meet even a constant is 1, the method not only can resist external attack, and can effectively prevent the sender tampered with, to satisfy the weak blind signature unforgeable, non-repudiation, blind and traceability requirements. This scheme has broad application prospect in electronic commerce, electronic currency and other Internet transactions.

Key words: quantum optics, weak blind signature, quantum entanglement, Bell State, entanglement swapping