Font Size: a A A

Research On Quantum Multi-proxy Blind Signature Protocol

Posted on:2020-11-18Degree:MasterType:Thesis
Country:ChinaCandidate:M Y LiuFull Text:PDF
GTID:2427330596469976Subject:Statistics
Abstract/Summary:PDF Full Text Request
In today's information society,people realize global resource sharing and interactive information through the network.Human daily activities mostly rely on the network system.In order to ensure the security of information transmission under the network conditions,information protection has always been an important task to be solved urgently.Under the modern cryptography system,digital signature can effectively guarantee the authenticity of information and authenticate the identity of both sides,which makes it the key technology of information protection.It plays an important role in the field of information security.However,from both physical and mathematical perspectives,existing classical digital signatures can not be proved to be unconditionally secure.With the increasing security needs of people,classical digital signature schemes begin to become unsafe.Quantum cryptography,based on its unconditional security and detectability,has attracted wide attention from various academic circles.Signature schemes based on quantum properties have aroused great interest.In order to meet people's security needs and improve the security of information transmission,researchers began to study quantum signatures based on quantum characteristics.As a new interdisciplinary subject,quantum signature has great theoretical value.In this paper,two kinds of quantum multi-proxy blind signature protocols which can be used in different scenarios are improved according to the different signature order of proxy signers and the properties of two kinds of special signatures,multiple proxy signatures and blind signatures.Now let's introduce these two kinds of protocols separately:1.When proxy signers need sequential signatures,such signatures are called ordered multiple proxy signatures.In the whole process of signature protocol,we use the unconditional security of key to improve the security of blind message,encoding the blind information into quantum single-particle sequence,and changing the single-particle sequence through simple unitary operation to realize the authorization and signature process.The verifier only needs to measure the single-particle sequence after signature.The whole process is simple to implement,does not need to prepare multi-particle entanglement,and the number of measurements does not need to berepeated.The communication cost of the whole protocol is low,which improves the efficiency of the protocol.Compared with the limitation of the existing multi-proxy signature schemes,this protocol can solve the problem of increasing or decreasing the number of proxy signers,which makes the protocol more flexible and applicable.Through case analysis,the specific process of the protocol is better explained.After describing the protocol,we explain the security feasibility of the protocol from the blindness,unforgeability and non-repudiation of signatures.The results of security analysis show that the protocol is secure and feasible,and can resist common quantum attacks.The protocol has good application value in electronic document signature.2.When the order of proxy signers' signatures is unrestricted,such signatures are called broadcast multi-signature protocols.Unlike most existing proxy signature protocols,the protocol does not need quantum entanglement for quantum teleportation,but uses quantum one-way function and quantum exchange test circuit diagrams to ensure the security of the protocol.The security of blind information is guaranteed by unconditional security of the key and information partition.From the threshold point of view,the security of blind information is guaranteed by Shamir threshold.Enjoy ideas and establish threshold keys.Blind information and threshold key can better guarantee the blindness and security of the protocol,and information segmentation can make the protocol more applicable.Finally,the protocol is discussed through the general security analysis mode,and the necessary conditions such as the blindness,unforgeability and non-repudiation of the protocol are analyzed.The results show that the security and feasibility of the protocol are realized.The protocol can be well used in privacy protection,multi-person electronic voting and multi-person electronic voting,and has good application value.
Keywords/Search Tags:quantum cryptography, quantum blind signature, quantum ordered multiple proxy, quantum broadcast multiple proxy
PDF Full Text Request
Related items