期刊文献+

The security analysis of a threshold proxy quantum signature scheme 被引量:5

The security analysis of a threshold proxy quantum signature scheme
原文传递
导出
摘要 In the YW threshold proxy quantum signature scheme proposed by Yang and Wen,it is found that the basic signature key is the same as the basic verification key,which means that the bitwise exclusive OR(XOR) of the t proxy signature keys is exactly the XOR of the t proxy verification keys.Therefore,the proxy signers can deny their signature and the specific verifiers can forge a legal signature.Furthermore,an attacker can obtain a legal threshold proxy signature for an arbitrary new message.These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme. In the YW threshold proxy quantum signature scheme proposed by Yang and Wen, it is found that the basic signature key is the same as the basic verification key, which means that the bitwise exclusive OR (XOR) of the t proxy signature keys is ex- actly the XOR of the t proxy verification keys. Therefore, the proxy signers can deny their signature and the specific verifiers can forge a legal signature. Furthermore, an attacker can obtain a legal threshold proxy signature for an arbitrary new message. These findings show that there are hidden security loopholes that should be carefully constructed in designing more efficent YW-scheme.
出处 《Science China Chemistry》 SCIE EI CAS 2013年第3期519-523,共5页 中国科学(化学英文版)
基金 supported by the National Natural Science Foundation of China (Grant No. 11204279)
关键词 quantum cryptography quantum signature threshold proxy signature secret sharing 门限代理签名 签名方案 安全性分析 量子 调查结果 安全漏洞 设计比较 温家宝
  • 相关文献

参考文献14

二级参考文献204

共引文献178

同被引文献30

引证文献5

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部