The Journal of China Universities of Posts and Telecommunications ›› 2019, Vol. 26 ›› Issue (3): 73-80.doi: 10.19682/j.cnki.1005-8885.2019.0017

• Security • Previous Articles     Next Articles

Cryptanalysis on “an arbitrated quantum signature protocol based on the chained CNOT operations encryption”

  

  • Received:2018-09-12 Revised:2019-04-11 Online:2019-06-30 Published:2019-06-30

Abstract: Arbitrated quantum signature (AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is discovered that an AQS protocol base on chained controlled-NOT (CNOT) algorithm is vulnerable to a novel attack because a transformation from binary keys into permutations and the chained CNOT algorithm have special properties, which enables a malicious receiver to forge signatures with probability 1/2. Moreover, a malicious signer can also deny his signatures with probability 1/4. Then, two possible improved methods are presented to resist these attacks: one is padding constants to reduce probability of the successful attacks, and the other is a circular chained CNOT algorithm to make the attack strategy invalid. And the security analysis shows that both the two improve methods could well resist these attacks.

Key words: arbitrated quantum signature, chained CNOT, forgery, disavowal