Abstract

Motivated by the quantum Fourier transform (QFT), a sequential quantum multiparty signature (QMS) scheme is proposed. Several signatories jointly accomplish the task in a chaotic encryption system. Alice generates and sends the encrypted message with the quantum Fourier transform. Signatories provide individual signatures in a certain order, while Bob verifies the authenticity of the combined multiple signatures after the eavesdropping check phase with help of the arbitrator. Analysis shows the correctness and security of the proposed scheme. This QMS protocol increases the efficiency of verification compared to arbitrated quantum signatures and broadcasting multiparty signature. This QMS protocol will be widely used for online e-government and e-business systems.

Highlights

  • In the field of cryptography, a digital signature is a digital simulation of a hand-written signature in real life and an implementation method for signing electronic documents [1]

  • These properties are applied to the image encryption, information hiding and other fields, since the properties can be used to meet the requirements of mixing and diffusion in the sense of cryptography [36]–[38]

  • We have introduced a quantum multiparty signature (QMS) based on the quantum Fourier transform (QFT) and chaotic system

Read more

Summary

INTRODUCTION

In the field of cryptography, a digital signature is a digital simulation of a hand-written signature in real life and an implementation method for signing electronic documents [1]. In the sequential multisig schemes, multiple signers sign the same message in a certain order. It is an interesting to consider that whether a quantum signature protocol can be designed in a way that allow the message to be signed by multiple parties. Compared with executions of AQS multiple times, the efficiency of proposed broadcasting QMS scheme has no obvious advantages. Such broadcasting QMS scheme usually consumes multiple sets of entangled quantum resources, and the measurement results of each signer need to be collected and verified, one by one.

CHAOTIC ENTANGLEMENT ENCRYPTION
CHAOTIC ENTANGLEMENT ENCRYPTION BASED ON CHAOTIC POSITION STRING
THE SIGNING PHASE
CORRECTNESS AND SECURITY ANALYSIS
IMPOSSIBILITY OF DISAVOWAL
Findings
DISCUSSION AND CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.