Abstract | ||
---|---|---|
We analyze the security of a sessional blind signature protocol based on quantum cryptograph and show that there are two security leaks in this protocol. One is that the legal user Alice can change the signed message after she gets a valid blind signature from the signatory Bob, and the other is that an external opponent Eve also can forge a valid blind message by a special attack, which are not permitted for blind signature. Therefore, this protocol is not secure in the sense that it does not satisfy the non-forgeability of blind signatures. We also discuss the methods to prevent the attack strategies in the end. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1007/s11128-014-0760-8 | Quantum Information Processing |
Keywords | Field | DocType |
Blind signature,Sessional blind signature,Non-forgeability,Quantum cryptography | Quantum,Computer security,Quantum mechanics,Quantum cryptography,Adversary,Blind signature,Physics | Journal |
Volume | Issue | ISSN |
13 | 8 | 1570-0755 |
Citations | PageRank | References |
2 | 0.42 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tian-Yin Wang | 1 | 43 | 6.01 |
Xiao-Qiu Cai | 2 | 21 | 3.33 |
Rui-Ling Zhang | 3 | 2 | 0.42 |