Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quant...Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.展开更多
Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a mu...Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.展开更多
With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user ...With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.展开更多
基金the National Natural Science Foundation of China(Grant Nos.61771294 and 61972235)。
文摘Threshold signature is an important branch of the digital signature scheme,which can distribute signature rights and avoid the abuse of signature rights.With the continuous development of quantum computation and quantum information,quantum threshold signatures are gradually becoming more popular.Recently,a quantum(t,n)threshold group signature scheme was analyzed that uses techniques such as quantum-controlled-not operation and quantum teleportation.However,this scheme cannot resist forgery attack and does not conform to the design of a threshold signature in the signing phase.Based on the original scheme,we propose an improved quantum(t,n)threshold signature scheme using quantum(t,n)threshold secret sharing technology.The analysis proves that the improved scheme can resist forgery attack and collusion attack,and it is undeniable.At the same time,this scheme reduces the level of trust in the arbitrator during the signature phase.
基金This project was financially supported by the Academy of Scientific Research and Technology(ASRT)in Egypt,under the project of Science Up,Grant no.6626.
文摘Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks.Recently,Liu et al.(Quantum Information Processing 18(8):1-10,2019)proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed.The aim of their protocol is to agree on a shared secret key among multiple remote participants.Liu et al.employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key.In addition,Liu et al.’s protocol guarantees that each participant makes an equal contribution to the final key.The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone.However,we show here that Liu et al.protocol is insecure against a collusive attack,where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.Additionally,the corresponding modifications are presented to address these security flaws in Liu et al.’s protocol.
基金Supported by the National Natural Science Foundation of China(61572390)the National Key Research and Development Program of China(2017YFB0802000)+1 种基金the National Natural Science Foundation of Ningbo City(201601HJ-B01382)the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing of Ministry of Education(Guilin University of Electronic Technology)(CRKL160202)
文摘With the advent of cloud storage, users can share their own data in the remote cloud as a group. To ensure the security of stored data and the normal operation of public auditing, once a user is revoked from the user group, the data files he signed should be resigned by other legal users in the group. In this paper, we propose a new re-signature scheme utilizing backup files to rebuild data which can resist the collusion between the cloud and revoked users, and we use Shamir Secret Sharing Scheme to encrypt data in the multi-managers system which can separate the authority of the group managers. Moreover, our scheme is more practical because we do not need managers to be online all the time. Performance evaluation shows that our mechanism can improve the efficiency of the process of data re-signature.