Abstract.
In an arbitrated signature scheme, all communications involve a so called arbitrator who has access to the contents of the messages. The security of most arbitrated signature schemes depends heavily on the trustworthiness of the arbitrators. In this paper we show how to construct an arbitrated quantum signature protocol of classical messages with an untrusted arbitrator. Its security is analyzed and it is proved to be secure even if the arbitrator is compromised. In addition, the proposed protocol does not require a direct quantum link between any two communicating users, which is an appealing advantage in the implementation of a practical quantum distributed communication network.
Similar content being viewed by others
References
D. Gottesman, I.L. Chuang, Technical Report, http://arxiv.org/abs/quant-ph/0105032,2001
H. Lee, C. Hong, H. KIM, J. Lim, H.J. Yang, Phys. Lett. A 321, 295 (2004)
X.J. Wen et al., Opt. Commun. 282, 666 (2009)
X.J. Wen, Y. Liu, N.R. Zhou, Int. J. Mod. Phys. B 22, 4251 (2008)
Y.G. Yang, Q.Y. Wen, Sci. China Ser. G 51, 1505 (2008)
Y.G. Yang, Q.Y. Wen, Sci. China Ser. G 51, 1079 (2008)
G.H. Zeng, K. Christoph, Phys. Rev. A 65, 042312-1-6 (2002)
M. Curty, N. Lutkenhaus, Phys. Rev. A 77, 046301 (2008)
G.H. Zeng, Phys. Rev. A 78, 016301 (2008)
G.H. Zeng, M.H. Lee, Y. Guo, G.Q. He, Int. J. Quantum Inf. 5, 553 (2007)
Q. Li, W.H. Chan, D.Y. Long, Phys. Rev. A 79, 054307 (2009)
X. Lü, D.G. Feng, CIS 2004, Lect. Notes Comp. Sci. 3314, 1054 (2004)
X. Lü, D.G. Feng, http://arxiv.org/abs/quant-ph/0403046 (2004)
J. Wang, Q. Zhang, C.J. Tang, http://arxiv.org/abs/quant-ph/0511224v1 (2005)
Z.J. Cao, O. Markowitch, Int. J. Quantum Inf. 7, 1205 (2009)
I. Ingemarsson, G.J. Simmons, in Advances in Cryptology – Proceedings of Eurocrypt’90 (Springer, Berlin, 1991), pp. 266–282
C.H. Bennett, G. Brassard, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), p. 175
A.K. Ekert, Phys. Rev. Lett. 67, 661 (1991)
C.H. Bennett, Phys. Rev. Lett. 68, 3121 (1992)
H.-K. Lo, H.F. Chau, Science 283, 2050 (1999)
P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)
X.H. Li, F.G. Deng, H.Y. Zhou, Phys. Rev. A 74, 054302 (2006)
M.A. Nielsen, I.L. Chuang, Quantum Computation and Quantum Information (Cambridge, Cambridge University Press, 2000)
P.W. Shor, Phys. Rev. A 52, 2493 (1995)
D. Kalamidas, Phys. Lett. A 343, 331 (2005)
Z.D. Walton, A.F. Abouraddy, A.V. Sergienko, B.E.A. Saleh, M.C. Teich, Phys. Rev. Lett. 91, 087901 (2003)
C.H. Bennett, G. Brassard, S. Popescu, B. Schumacher, J.A. Smolin, W.K. Wootters, Phys. Rev. Lett. 76, 722 (1996)
J.W. Pan, C. Simon, C. Brukner, A. Zelinger, Nature 410, 1067 (2001)
J.C. Boileau et al., Phys. Rev. Lett. 92, 017901 (2004)
X.B. Wang, Phys. Rev. A 72, 050304 (2005)
Q. Zhang et al., Phys. Rev. A 73, 020301 (2006)
Z.J. Zhang, Physica A 361, 233 (2006)
C.E.R. Souza et al., Phys. Rev. A 77, 032345 (2008)
X.H. Li, F.G. Deng, H.Y. Zhou, Phys. Rev. A 78, 022321 (2008)
C. Crépeau, D. Gottesman, A. Smith, in Proceedings of the 34th Annual ACM Symposium on Theory of Computing (ACM, New York, 2002), pp. 643–652
M. Ben-Or, C. Crépeau, D. Gottesman, A. Hassidim, A. Smith, in Proceedings of 47th Annual IEEE Symposium on the Foundations of Computer Science (IEEE, Los Alamitos, 2006), pp. 249–260
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yang, YG., Zhou, Z., Teng, YW. et al. Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011). https://doi.org/10.1140/epjd/e2010-10157-4
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1140/epjd/e2010-10157-4