A (t,n)-Threshold Scheme of Multi-party Quantum Group Signature with Irregular Quantum Fourier Transform
详细信息    查看全文
  • 作者:Jinjing Shi (13) sjjgz2009@gmail.com
    Ronghua Shi (1)
    Ying Guo (1)
    Xiaoqi Peng (2) pengxq126@126.com
    Moon Ho Lee (3) moonho@chonbuk.ac.kr
    Dongsun Park (3)
  • 关键词:Quantum signature – ; Group signature – ; Threshold – ; Irregular QFT
  • 刊名:International Journal of Theoretical Physics
  • 出版年:2012
  • 出版时间:April 2012
  • 年:2012
  • 卷:51
  • 期:4
  • 页码:1038-1049
  • 全文大小:519.6 KB
  • 参考文献:1. Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information, pp. 171–180. Cambridge University Press, Cambridge (2000)
    2. Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum Fourier transform. Phys. Rev. Lett. 86(9), 1889–1891 (2001) <Occurrence Type="Bibcode"><Handle>2001PhRvL..86.1889W</Handle></Occurrence>
    3. Zhou, N.R., Wang, L.J., Ding, J., Gong, L.H.: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010) <Occurrence Type="Bibcode"><Handle>2010PhyS...81d5009Z</Handle></Occurrence>
    4. Zhou, N.R., Wang, L.J., Ding, J., Gong, L.H.: Novel quantum deterministic key distribution protocols with entanglement. Int. J. Theor. Phys. 49(9), 2035–2044 (2010)
    5. Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032v2 (2001)
    6. William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn., pp. 67–70. Prentice-Hall, New York (2003)
    7. Chaum, D., Heyst, E.V.: Group signatures. In: Advances in Cryptography-EUROCRYPT’91. Lecture Notes in Computer Science, vol. 547, pp. 257–265 (1991)
    8. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn., pp. 79–80. Wiley, New York (1996)
    9. Zeng, G.H., Ma, W.P., Wang, X.M., Zhu, H.W.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1–3 (2001)
    10. Zeng, G.H., Keitel, C.H.: Arbitrated quantum signature scheme. Phys. Rev. A 65, 042312 (2002) <Occurrence Type="Bibcode"><Handle>2002PhRvA..65d2312Z</Handle></Occurrence>
    11. Curty, M., Lutkenhaus, N.: Comment on “Arbitrated quantum-signature scheme”. Phys. Rev. A 77, 046301 (2008) <Occurrence Type="Bibcode"><Handle>2008PhRvA..77d6301C</Handle></Occurrence>
    12. Zeng, G.H.: Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ”. Phys. Rev. A 78, 016301, (2008) <Occurrence Type="Bibcode"><Handle>2008PhRvA..78a6301Z</Handle></Occurrence>
    13. Zeng, G.H., Lee, M.H., Guo, Y., He, G.Q.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(4), 553–573 (2007)
    14. Lee, H., Hong, C.H., Kim, H.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 32, 295–300 (2004) <Occurrence Type="Bibcode"><Handle>2004PhLA..321..295L</Handle></Occurrence>
    15. Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17(2), 415–418 (2008) <Occurrence Type="Bibcode"><Handle>2008ChPhB..17..415Y</Handle></Occurrence>
    16. Yang, Y.G., Wen, Q.Y.: Quantum threshold group signature. SCICHINA 38(9), 1162–1170 (2008)
    17. Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009) <Occurrence Type="Bibcode"><Handle>2009PhRvA..79e4307L</Handle></Occurrence>
    18. Wen, X.J., Yuan, Y., Ji, L.P., Niu, X.M.: A group signature scheme based on quantum teleportation. Phys. Scr. 81(5), 055001 (2010) <Occurrence Type="Bibcode"><Handle>2010PhyS...81e5001W</Handle></Occurrence>
    19. Wen, X.J.: An E-payment system based on quantum group signature. Phys. Scr. 82(6), 065403 (2010)
    20. Xu, R., Sheng, L.S., Yang, W., He, L.B.: Quantum group blind signature scheme without entanglement, Quantum group blind signature scheme without entanglement. Opt. Commun. 1–5 (2011). doi:10.1016/j.optcom.2011.03.083
    21. Hales, L., Hallgren, S.: An improved quantum Fourier transform algorithm and applications. In: 41st Annual Symposium on Foundations of Computer Science, vols. 12–14, pp. 515–525 (2000)
    22. Duan, R.Y., Ji, Z.F., Feng, Y., Ying, M.S.: Quantum operation, quantum Fourier transform and semi-definite programming. Phys. Lett. A 323, 48–56 (2004) <Occurrence Type="Bibcode"><Handle>2004PhLA..323...48D</Handle></Occurrence>
    23. Huang, D.Z., Chen, Z.G., Guo, Y.: Multiparty quantum secret sharing using quantum Fourier transform. Commun. Theor. Phys. 51(2), 221–226 (2009) <Occurrence Type="Bibcode"><Handle>2009CoTPh..51..221H</Handle></Occurrence>
    24. Shi, J.J., Shi, R.H., Tang, Y., Lee, M.H.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 1–18 (2011). doi:10.1007/s11128-010-0225-7
    25. Zhou, N.R., Wang, Y.X., Gong, L.H., He, H., Wu, J.H.: Novel single-channel color image encryption algorithm based on chaos and fractional Fourier transform. Opt. Commun. 284(12), 2789–2796 (2011) <Occurrence Type="Bibcode"><Handle>2011OptCo.284.2789Z</Handle></Occurrence>
    26. Briegel, H.J., Raussendorf, R.: Persistent entanglement in arrays of interacting particles. Phys. Rev. Lett. 86(5), 910–913 (2001) <Occurrence Type="Bibcode"><Handle>2001PhRvL..86..910B</Handle></Occurrence>
    27. Nielsen, M.A.: Cluster-state quantum computation. Rep. Math. Phys. 57(1), 147–161 (2006) <Occurrence Type="Bibcode"><Handle>2006RpMP...57..147N</Handle></Occurrence>
    28. Oliveira, D.S., Ramos, R.V.: Quantum bit string comparator: circuits and applications. Quantum Comput. Comput. 7(1), 17–26 (2007)
    29. Renner, R.: Security of quantum key distribution. arXiv:quant-ph/0512258v2 (2006)
  • 作者单位:1. School of Information Science and Engineering, Central South University, Changsha, 410083 China2. Department of Information Science and Engineering, Hunan First Normal University, Changsha, 410205 China3. Institute of Information and Communication, Chonbuk National University, Chonju, 561-756 Korea
  • 刊物类别:Physics and Astronomy
  • 刊物主题:Physics
    Physics
    Quantum Physics
    Elementary Particles and Quantum Field Theory
    Mathematical and Computational Physics
  • 出版者:Springer Netherlands
  • ISSN:1572-9575
文摘
A novel (t,n)-threshold scheme for the multi-party quantum group signature is proposed based on the irregular quantum Fourier transform, in which every t-qubit quantum message needs n participants to generate the quantum group signature. All the quantum operation gates in the quantum circuit can be distributed and arranged randomly in the irregular QFT algorithm, which can increase the von Neumann entropy of the signed quantum message and the randomicity of the quantum signature generation significantly. The generation and verification of the quantum group signature can be both performed in quantum circuits with the parallel algorithm. Security analysis shows that an available and legal quantum (t,n)-threshold group signature can be achieved.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700