当前位置:主页 > 科技论文 > 信息工程论文 >

量子代理多重盲签名协议设计与分析

发布时间:2019-06-20 12:07
【摘要】:数字签名作为密码学的一个重要分支已经被广泛应用于提供安全的电子通信。数字签名具有身份认证、不可否认和数据的完整性等特质适合解决某些任务的安全问题,例如电子交易系统中的安全支付、电子合同的安全签订等。现今所使用的数字签名方案大都是基于公钥密码体制,其安全性基于某些数学难题的计算复杂度,例如离散对数、大整数素数分解等。随着计算机运算能力的不断提升,特别是量子计算机的提出,所有基于计算复杂性的数字签名方案都将会变得不安全。因此,数字签名的安全性不能再依赖于数学难解问题,而是应该为数字签名提供信息论安全。量子签名不同于传统的数字签名,它是利用量子物理学方法实现数字签名思想的一种新型签名体制,其安全性由量子力学基本原理保证,这些基本原理已被证明是无条件安全的。因此,量子签名受到越来越多的关注和青睐。针对现有的量子代理盲签名协议只能实现代理单重,本文主要对量子代理多重盲签名协议的设计和安全性进了研究和探索,分别根据量子纠缠和量子隐形传态的特性提出了两个量子代理多重盲签名协议,并对协议进行了详细的安全性分析和效率分析。主要研究成果如下:(1)提出了一个可公开认证的量子代理多重盲签名协议。该方案以GHZ态为基础,利用秘密共享原理实现多个原始签名人对代理签名人的授权,并结合经典编码方法实现对量子比特串的签名和验证。由于签名的产生没有使用验证者的密钥,因此任意验证者可根据量子单向函数和酉操作的特性验证签名是否有效,使得协议的应用场景更加广泛。协议的安全性基于无条件安全的量子密钥分发协议和一次一密算法。(2)提出了一个基于量子隐形传态的代理多重盲签名协议。该方案引入相位旋转操作,巧妙的实现了代理签名者代理多重的目的,而且确保了代理签名者的操作复杂性与原始签名人的数量无关。协议将Bell态中的两个粒子分别发送给原始签名者和验证者,原始签名者根据子密钥对粒子施加相位旋转局域操作,操作完成后将粒子序列发送给代理签名者。代理签名者根据原始签名者的授权证书对粒子序列施加逆复合操作还原Bell态,并在Bell基下对该粒子和待签名序中的粒子执行联合测量产生签名。验证者根据签名,对Bell态中的另一粒子施加相应酉操作产生待验证序列,与待签名序列比较,根据比较结果判断签名是否有效。协议安全性高且技术要求相对简单。通过分析表明:安全性方面,两个方案都能够满足签名的不可否认、不可伪造和盲性;效率方面,两个方案的签名效率与已有方案相比都有相对提高。
[Abstract]:As an important branch of cryptography, digital signature has been widely used to provide secure electronic communication. Digital signature has the characteristics of identity authentication, undeniable data integrity and so on, which is suitable for solving the security problems of some tasks, such as secure payment in electronic trading system, secure signing of electronic contract and so on. Nowadays, most of the digital signature schemes are based on public key cryptography, and their security is based on the computational complexity of some mathematical problems, such as discrete logarithm, large integer prime decomposition and so on. With the continuous improvement of computer computing power, especially the proposed quantum computer, all digital signature schemes based on computational complexity will become insecure. Therefore, the security of digital signature can no longer depend on the mathematical problem, but should provide information theory security for digital signature. Different from the traditional digital signature, quantum signature is a new signature scheme which uses quantum physics to realize the idea of digital signature. Its security is guaranteed by the basic principles of quantum mechanics, which have been proved to be unconditional security. Therefore, quantum signature has received more and more attention and favor. In view of the fact that the existing quantum proxy blind signature protocols can only implement proxy single signature, this paper mainly studies and explores the design and security of quantum proxy multiple blind signature protocols. According to the characteristics of quantum entanglement and quantum teletransfer, two quantum proxy multiple blind signature protocols are proposed, and the security and efficiency of the protocols are analyzed in detail. The main research results are as follows: (1) A publicly authenticated quantum proxy multiple blind signature protocol is proposed. Based on GHz state, the scheme uses the principle of secret sharing to realize the authorization of multiple original signatories to proxy signatories, and combines the classical coding method to realize the signature and verification of quantum bit strings. Because the signature is generated without the key of the verifier, any verifier can verify the validity of the signature according to the characteristics of quantum one-way function and unitary operation, which makes the application scenario of the protocol more extensive. The security of the protocol is based on unconditionally secure quantum key distribution protocol and one secret algorithm at a time. (2) A proxy multiple blind signature protocol based on quantum teletransmission is proposed. In this scheme, the phase rotation operation is introduced, which skillfully realizes the multiple purpose of proxy signer agent, and ensures that the operation complexity of proxy signer is independent of the number of original signatories. The protocol sends two particles in the Bell state to the original signer and the verifier respectively. The original signer applies a phase rotation local operation to the particle according to the subkey, and sends the particle sequence to the proxy signer after the operation is completed. According to the authorization certificate of the original signer, the proxy signer applies inverse recombination operation to restore Bell state to the particle sequence, and performs joint measurement of the particle and the particle in the order to be signed on the Bell basis. According to the signature, the verifier applies the corresponding unitary operation to another particle in Bell state to generate the sequence to be verified. Compared with the sequence to be signed, the verifier determines whether the signature is valid according to the comparison results. The protocol has high security and relatively simple technical requirements. The analysis shows that in terms of security, the two schemes can meet the undeniable, non-forgery and blindness of signature, and the efficiency of the two schemes is relatively higher than that of the existing schemes.
【学位授予单位】:安徽大学
【学位级别】:硕士
【学位授予年份】:2017
【分类号】:TN918.91

【参考文献】

相关期刊论文 前10条

1 杜成斌;石润华;仲红;崔杰;张顺;许艳;;高效的量子有序多重签名协议[J];量子电子学报;2016年03期

2 温巧燕;秦素娟;高飞;;量子密码协议安全性分析[J];密码学报;2014年02期

3 杜宇韬;鲍皖苏;管文强;周淳;付向群;;基于密集编码的多方与多方量子秘密共享[J];电子与信息学报;2013年11期

4 ;Quantum proxy signature scheme with public verifiability[J];Science China(Physics,Mechanics & Astronomy);2011年10期

5 李伟;范明钰;王光卫;;基于纠缠交换的仲裁量子签名方案[J];物理学报;2011年08期

6 王天银;温巧燕;;Fair quantum blind signatures[J];Chinese Physics B;2010年06期

7 ;Quantum threshold group signature[J];Science in China(Series G:Physics,Mechanics & Astronomy);2008年10期

8 杨宇光;;Multi-proxy quantum group signature scheme with threshold shared verification[J];Chinese Physics B;2008年02期

9 王剑;张权;唐朝京;;针对经典消息的高效量子签名协议[J];通信学报;2007年01期

10 ;Quantum signature scheme with single photons[J];Optoelectronics Letters;2006年03期



本文编号:2503208

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/xinxigongchenglunwen/2503208.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户a705f***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com