Quantum blind signature message authenticity protection method

An authenticity and message technology, applied in the field of information security, can solve the problems of blind signature authenticity threat, blind signature message authenticity cannot be effectively protected, etc.

Inactive Publication Date: 2017-02-22
HUNAN UNIV OF ARTS & SCI
View PDF2 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although these blind signature technologies hide the signature message from the signer, and can resist some integrity and non-repudiation attacks, however, there is a common security problem in the existing quantum blind signature technology: the verifier does not need the communication key , only using the existing signature to successfully forge a valid signature, which poses a threat to the authenticity of the blind signature
[0005] Therefore, the authenticity of blindly signed messages cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum blind signature message authenticity protection method
  • Quantum blind signature message authenticity protection method
  • Quantum blind signature message authenticity protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific embodiments.

[0041] The invention discloses a method for protecting message authenticity in quantum blind signing.

[0042] Specific steps are as follows:

[0043] Step 1. Preparation stage: the customer uses the quantum key distribution protocol, and the customer and the merchant share the key K ab , the customer shares the key K with the bank ac , the corresponding merchant and bank shared key K bc , the protocol obtained using the quantum key distribution protocol is unconditionally secure.

[0044] The bank according to the key K bcGenerate n pairs of EPR entangled particle pairs |Ψ aibi >, the generated method is expressed by the following formula:

[0045]

[0046] In formula (1), a i ,b i is the i-th subscript of the entangled particle pair g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum blind signature message authenticity protection method which sequentially includes a preparation stage, a message blinding stage, a blind signature stage, a receiving verification stage and an arbitration stage. A customer respectively shares a key with other customers and sellers by the aid of a quantum key distribution protocol and applies for signature from a bank after encrypting and blinding messages by the key, the messages are transmitted to the sellers after blind signature of the bank, and the sellers accept valid blind signature after verification. When the customer and the sellers are in dispute, the bank is introduced as a trustworthy arbitrator for arbitration, judges the condition of even bits according to the key and then compares odd bits, and the signature is regarded as invalid signature if one bit does not conform to rules. When the signature of application messages or blind messages is modified, the signature can be verified, and blind signature message authenticity is ensured.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method for protecting message authenticity in quantum blind signing. Background technique [0002] Digital signature technology is mainly used to protect the authenticity, integrity and non-repudiation of messages. Blind signatures are a variation of digital signatures in which the signer cannot see the content of the signed message when signing the message. Blind signatures are carried out among the signer, verifier and arbitrator, and play an important role in electronic voting, electronic payment systems and other fields. However, the security of traditional blind signature technology solutions is generally based on certain mathematical problems, such as large number decomposition problems and discrete logarithm problems. With the continuous improvement of computer computing speed and the introduction of various advanced algorithms, especially quantum computers...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
Inventor 娄小平陈潇潇
Owner HUNAN UNIV OF ARTS & SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products