TY - JOUR
T1 - The security analysis of a threshold proxy quantum signature scheme
AU - Shi, Jianhong
AU - Zhang, Shengli
AU - Chang, Zhenggang
PY - 2013/3
Y1 - 2013/3
N2 - In the YW threshold proxy quantum signature scheme proposed by Yang and Wen, it is found that the basic signature key is the same as the basic verification key, which means that the bitwise exclusive OR (XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys. Therefore, the proxy signers can deny their signature and the specific verifiers can forge a legal signature. Furthermore, an attacker can obtain a legal threshold proxy signature for an arbitrary new message. These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme.
AB - In the YW threshold proxy quantum signature scheme proposed by Yang and Wen, it is found that the basic signature key is the same as the basic verification key, which means that the bitwise exclusive OR (XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys. Therefore, the proxy signers can deny their signature and the specific verifiers can forge a legal signature. Furthermore, an attacker can obtain a legal threshold proxy signature for an arbitrary new message. These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme.
KW - Quantum cryptography
KW - Quantum signature
KW - Secret sharing
KW - Threshold proxy signature
UR - http://www.scopus.com/inward/record.url?scp=84881304974&partnerID=8YFLogxK
U2 - 10.1007/s11433-013-5000-1
DO - 10.1007/s11433-013-5000-1
M3 - Article
AN - SCOPUS:84881304974
SN - 1674-7348
VL - 56
SP - 519
EP - 523
JO - Science China: Physics, Mechanics and Astronomy
JF - Science China: Physics, Mechanics and Astronomy
IS - 3
ER -