Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Arbitrated quantum signature with an untrusted arbitrator

  • Published:
The European Physical Journal D Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract.

In an arbitrated signature scheme, all communications involve a so called arbitrator who has access to the contents of the messages. The security of most arbitrated signature schemes depends heavily on the trustworthiness of the arbitrators. In this paper we show how to construct an arbitrated quantum signature protocol of classical messages with an untrusted arbitrator. Its security is analyzed and it is proved to be secure even if the arbitrator is compromised. In addition, the proposed protocol does not require a direct quantum link between any two communicating users, which is an appealing advantage in the implementation of a practical quantum distributed communication network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. D. Gottesman, I.L. Chuang, Technical Report, http://arxiv.org/abs/quant-ph/0105032,2001

  2. H. Lee, C. Hong, H. KIM, J. Lim, H.J. Yang, Phys. Lett. A 321, 295 (2004)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  3. X.J. Wen et al., Opt. Commun. 282, 666 (2009)

    Article  ADS  Google Scholar 

  4. X.J. Wen, Y. Liu, N.R. Zhou, Int. J. Mod. Phys. B 22, 4251 (2008)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  5. Y.G. Yang, Q.Y. Wen, Sci. China Ser. G 51, 1505 (2008)

    Article  Google Scholar 

  6. Y.G. Yang, Q.Y. Wen, Sci. China Ser. G 51, 1079 (2008)

    Article  MATH  Google Scholar 

  7. G.H. Zeng, K. Christoph, Phys. Rev. A 65, 042312-1-6 (2002)

    Google Scholar 

  8. M. Curty, N. Lutkenhaus, Phys. Rev. A 77, 046301 (2008)

    Article  ADS  Google Scholar 

  9. G.H. Zeng, Phys. Rev. A 78, 016301 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  10. G.H. Zeng, M.H. Lee, Y. Guo, G.Q. He, Int. J. Quantum Inf. 5, 553 (2007)

    Article  MATH  Google Scholar 

  11. Q. Li, W.H. Chan, D.Y. Long, Phys. Rev. A 79, 054307 (2009)

    Article  MathSciNet  ADS  Google Scholar 

  12. X. Lü, D.G. Feng, CIS 2004, Lect. Notes Comp. Sci. 3314, 1054 (2004)

    Article  Google Scholar 

  13. X. Lü, D.G. Feng, http://arxiv.org/abs/quant-ph/0403046 (2004)

  14. J. Wang, Q. Zhang, C.J. Tang, http://arxiv.org/abs/quant-ph/0511224v1 (2005)

  15. Z.J. Cao, O. Markowitch, Int. J. Quantum Inf. 7, 1205 (2009)

    Article  MATH  Google Scholar 

  16. I. Ingemarsson, G.J. Simmons, in Advances in Cryptology – Proceedings of Eurocrypt’90 (Springer, Berlin, 1991), pp. 266–282

  17. C.H. Bennett, G. Brassard, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), p. 175

  18. A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  19. C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  20. H.-K. Lo, H.F. Chau, Science 283, 2050 (1999)

    Article  ADS  Google Scholar 

  21. P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)

    Article  ADS  Google Scholar 

  22. X.H. Li, F.G. Deng, H.Y. Zhou, Phys. Rev. A 74, 054302 (2006)

    Article  ADS  Google Scholar 

  23. M.A. Nielsen, I.L. Chuang, Quantum Computation and Quantum Information (Cambridge, Cambridge University Press, 2000)

  24. P.W. Shor, Phys. Rev. A 52, 2493 (1995)

    Article  ADS  Google Scholar 

  25. D. Kalamidas, Phys. Lett. A 343, 331 (2005)

    Article  ADS  MATH  Google Scholar 

  26. Z.D. Walton, A.F. Abouraddy, A.V. Sergienko, B.E.A. Saleh, M.C. Teich, Phys. Rev. Lett. 91, 087901 (2003)

    Article  ADS  Google Scholar 

  27. C.H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J.A. Smolin, W.K. Wootters, Phys. Rev. Lett. 76, 722 (1996)

    Article  ADS  Google Scholar 

  28. J.W. Pan, C. Simon, C. Brukner, A. Zelinger, Nature 410, 1067 (2001)

    Article  ADS  Google Scholar 

  29. J.C. Boileau et al., Phys. Rev. Lett. 92, 017901 (2004)

    Article  ADS  Google Scholar 

  30. X.B. Wang, Phys. Rev. A 72, 050304 (2005)

    Article  ADS  Google Scholar 

  31. Q. Zhang et al., Phys. Rev. A 73, 020301 (2006)

    Article  ADS  Google Scholar 

  32. Z.J. Zhang, Physica A 361, 233 (2006)

    Article  ADS  Google Scholar 

  33. C.E.R. Souza et al., Phys. Rev. A 77, 032345 (2008)

    Article  MathSciNet  ADS  Google Scholar 

  34. X.H. Li, F.G. Deng, H.Y. Zhou, Phys. Rev. A 78, 022321 (2008)

    Article  ADS  Google Scholar 

  35. C. Crépeau, D. Gottesman, A. Smith, in Proceedings of the 34th Annual ACM Symposium on Theory of Computing (ACM, New York, 2002), pp. 643–652

  36. M. Ben-Or, C. Crépeau, D. Gottesman, A. Hassidim, A. Smith, in Proceedings of 47th Annual IEEE Symposium on the Foundations of Computer Science (IEEE, Los Alamitos, 2006), pp. 249–260

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yu-Guang Yang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yang, YG., Zhou, Z., Teng, YW. et al. Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011). https://doi.org/10.1140/epjd/e2010-10157-4

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1140/epjd/e2010-10157-4

Keywords