Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quant...Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.展开更多
With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiatio...With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.展开更多
To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-f...To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.展开更多
Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a mu...Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.展开更多
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.展开更多
Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (20...Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack.展开更多
With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user ...With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.展开更多
基金the National Natural Science Foundation of China(Grant Nos.61771294 and 61972235)。
文摘Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.
文摘With development of electronic com- merce, non-repudiation protocol as the basal component of non-repudiation service has done more and more important functions. Comparing with lots of work on two-party non-repudiation, there are less work on multi-party non-repudiation protocol. Multi-party protocol is more complex and facing more challenge of collusion attack. In this paper we give a kind of multi-party non-repudiation protocol based on off-line TTP with consistent evidence. Consistent evidence is a property that can not only simplify the process of disputation resolving, but also make the service more friendly to users, which means that whether or not TTP involves, evidences participants obtained are consistent. In the meanwhile we analyze the collusion attack that multi-party protocol facing, our protocol can prevent collusion attack.
基金The National Natural Science Foundation of China(No.61372103)the Natural Science Foundation of Jiangsu Province(No.BK20201265)the Key Laboratory of Computer Network Technology of Jiangsu Province。
文摘To verify that an organization-friendly blockchain system may suffer from forgery and collusion attacks,forgery and collusion attacks were theoretically carried out according to the phase sequence of an organization-friendly blockchain system.Then,the organization-friendly blockchain system was improved and based on the phase sequence forgery and collusion attacks were conducted.The results show that the attacker can obtain illegal transaction data from forgery and collusion attacks on the organization-friendly blockchain system.However,for the improved organization-friendly blockchain,the attacker s forgery and collusion attacks cannot be completed.Therefore,the organization-friendly blockchain system may be subject to forgery and collusion attacks,but the improved organization-friendly blockchain system can prevent such attacks.
基金This project was financially supported by the Academy of Scientific Research and Technology(ASRT)in Egypt,under the project of Science Up,Grant no.6626.
文摘Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61103235,61170321,and 61373131the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)+1 种基金the Natural Science Foundation of Jiangsu Province,China(BK2010570)State Key Laboratory of Software Engineering,Wuhan University(SKLSE2012-09-41)
文摘Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.
基金Supported by the National Natural Science Foundation of China under Grant Nos. 61003287, 61170272the Specialized Research Fund for the Doctoral Program of Higher Education under Grant No. 20100005120002+1 种基金the Fok Ying Tong Education Foundation under Grant No. 131067the Fundamental Research Funds for the Central Universities under Grant No. BUPT2012RC0221
文摘Recently, Gao et al.'s [Commun. Theor. Phys. 52 (2009) 421] multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was enhanced by Hwang et al. [Commun. Theor. Phys. 56 (2011) 79]. The improved protocol removes some unnecessary unitary operations, devices, and transmissions by the technique of decoy single photons and careful modification. However, in this paper, we investigate the security of the improved protocol and find it is insecure. The eavesdropper can steal all Alice's secret information. Furthermore, a feasible modification to remedy the security loophole is put forward. Our improved protocol provides a basic method to modify a kind of MQSS protocols which cannot resist the collusion attack.
基金Supported by the National Natural Science Foundation of China(61572390)the National Key Research and Development Program of China(2017YFB0802000)+1 种基金the National Natural Science Foundation of Ningbo City(201601HJ-B01382)the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing of Ministry of Education(Guilin University of Electronic Technology)(CRKL160202)
文摘With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.