簡易檢索 / 詳目顯示

研究生: 林才琛
Lin, Tsai-Chen
論文名稱: 仲裁式量子盲簽章及其應用
Arbitrated Quantum Blind Signature and Its Applications
指導教授: 黃宗立
Hwang, Tzone-Lih
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2016
畢業學年度: 104
語文別: 英文
論文頁數: 72
中文關鍵詞: 量子密碼學仲裁式量子簽章量子代理簽章量子盲簽章量子投票系統
外文關鍵詞: Quantum cryptography, Arbitrated quantum signature, Quantum proxy signature, Quantum blind signature, Quantum voting system
相關次數: 點閱:111下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在這篇論文中,我們首先提出一基於貝爾態糾纏置換的仲裁式量子簽章協定,並提出two-step及three-step兩種驗證方式;藉由仲裁者的幫忙,參與者之間的紛爭得以順利解決。除此之外,基於此協定我們接著提出仲裁式量子盲簽章協定,此協定可滿足盲簽章的安全性要求;最後基於此仲裁式盲簽章協定,提出仲裁式代理盲簽章協定及量子投票系統兩個協定。提出的四個協定不但能滿足環境上的安全性要求,更擁有不需要量子儲存器等優點。

    In this thesis, we first propose an arbitrated quantum signature (AQS) scheme based on the entanglement swapping of Bell states and two ways for verification: two-step and three-step. Through the help of an arbitrator the disputes between participants can be easily resolved. Besides, based on the AQS scheme, we further present the arbitrated quantum blind signature (AQBS) scheme. Finally, on the basis of the AQBS scheme, we propose the arbitrated quantum proxy blind signature (AQPBS) scheme and the quantum anonymous voting system (QVS). The four proposed schemes can not only meet the requirements of different environments but also has the advantage of no need of quantum memory when compared to the existing protocols.

    中文摘要 i Abstract ii 誌謝 iii Content iv List of Tables vii List of Figures viii Chapter 1 Introduction 1 1.1 Overview 1 1.2 Motivation and Contribution 2 1.3 Thesis Structure 6 Chapter 2 Preliminaries 7 2.1 The Properties of Single Photon 7 2.2 Unitary Operation 9 2.3 The Properties of Entangled States 9 2.3.1 Bell State and Entanglement Swapping 10 2.3.2 GHZ States 12 Chapter 3 Arbitrated Quantum Signature Scheme 14 3.1 Quantum Signature Properties 14 3.2 Arbitrated Quantum Signature Scheme 14 3.2.1 The Key-sharing Phase 16 3.2.2 The Signature Phase 16 3.2.3 The Verification Phase 18 3.3 Discussions 21 3.3.1 Security Analysis 22 3.3.2 Key Usage Analysis 23 3.3.3 Comparison 24 Chapter 4 Arbitrated Quantum Blind Signature Scheme 27 4.1 Quantum Blind Signature Properties 27 4.2 Arbitrated Quantum Blind Signature Scheme 27 4.2.1 The Key-sharing Phase 28 4.2.2 The Signature Phase 29 4.2.3 The Verification Phase 31 4.3 Discussions 33 4.3.1 Security Analysis 33 4.3.2 Key Usage Analysis 35 4.3.3 Comparison 37 Chapter 5 Arbitrated Quantum Proxy Blind Signature Scheme 40 5.1 Quantum Proxy Blind Signature Properties 40 5.2 Arbitrated Quantum Proxy Blind Signature Scheme 40 5.2.1 The Key-sharing Phase 41 5.2.2 The Authorization Phase 42 5.2.3 The Signature Phase 45 5.2.4 The Verification Phase 47 5.3 Discussions 48 5.3.1 Security Analysis 48 5.3.2 Key Usage Analysis 51 5.3.3 Comparison 54 Chapter 6 Quantum Voting System 57 6.1 Quantum Voting System Properties 57 6.2 Quantum Voting System 57 6.2.1 The Key-sharing Phase 59 6.2.2 The Registration Phase 59 6.2.3 The Voting Phase 61 6.2.4 The Counting Phase 63 6.3 Discussions 65 6.3.1 Requirements Analysis 66 6.3.2 Disputes Analysis 68 6.3.3 Collision Attack Analysis 70 6.3.4 Comparison 72 Chapter 7 Conclusions 74 Bibliography 75

    1. Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. in Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. 1994. IEEE.
    2. Grover, L.K., Quantum mechanics helps in searching for a needle in a haystack. Physical review letters, 1997. 79(2): p. 325.
    3. Wootters, W.K. and W.H. Zurek, A single quantum cannot be cloned. Nature, 1982. 299(5886): p. 802-803.
    4. Bennett, C.H. Quantum cryptography: Public key distribution and coin tossing. in International Conference on Computer System and Signal Processing, IEEE, 1984. 1984.
    5. Gottesman, D. and I. Chuang, Quantum digital signatures. arXiv preprint quant-ph/0105032, 2001.
    6. Tian, Y., et al., A proxy blind signature scheme based on quantum entanglement. Optical and Quantum Electronics, 2013. 45(12): p. 1297-1305.
    7. Cai, X.-Q. and C.-Y. Wei, Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Information Processing, 2013. 12(4): p. 1651-1657.
    8. Shi, J., et al., Batch proxy quantum blind signature scheme. Science China Information Sciences, 2013. 56(5): p. 1-9.
    9. Wen, X., Y. Chen, and J. Fang, An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum information processing, 2013. 12(1): p. 549-558.
    10. Cai, X.-Q., Y.-H. Zheng, and R.-L. Zhang, Cryptanalysis of a batch proxy quantum blind signature scheme. International Journal of Theoretical Physics, 2014. 53(9): p. 3109-3115.
    11. Cao, H.-J., Y.-Y. Zhu, and P.-F. Li, A quantum proxy weak blind signature scheme. International Journal of Theoretical Physics, 2014. 53(2): p. 419-425.
    12. Cao, H.-J., et al., A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation. International Journal of Theoretical Physics, 2015. 54(4): p. 1325-1333.
    13. Zhang, K.-J. and H.-Y. Jia, Cryptanalysis of a quantum proxy weak blind signature scheme. International Journal of Theoretical Physics, 2015. 54(2): p. 582-588.
    14. Hillery, M., et al., Towards quantum-based privacy and voting. Physics Letters A, 2006. 349(1): p. 75-81.
    15. Rong-Hua, S., et al., Anonymous voting for multi-dimensional CV quantum system.
    16. Vaccaro, J.A., J. Spring, and A. Chefles, Quantum protocols for anonymous voting and surveying. Physical Review A, 2007. 75(1): p. 012333.
    17. Li, Y. and G. Zeng, Quantum anonymous voting systems based on entangled state. Optical review, 2008. 15(5): p. 219-223.
    18. Rong-Hua, S., et al., Quantum Distributed Ballot Scheme Based on Greenberger–Home–Zeilinger State. Communications in Theoretical Physics, 2010. 54(2): p. 257.
    19. Bonanome, M., et al., Toward protocols for quantum-ensured privacy and secure voting. Physical Review A, 2011. 84(2): p. 022331.
    20. Horoshko, D. and S. Kilin, Quantum anonymous voting with anonymity check. Physics Letters A, 2011. 375(8): p. 1172-1175.
    21. Jiang, L., et al., Quantum anonymous voting for continuous variables. Physical Review A, 2012. 85(4): p. 042309.
    22. Li, Y. and G. Zeng, Anonymous quantum network voting scheme. Optical review, 2012. 19(3): p. 121-124.
    23. Rui-Rui, Z. and Y. Li, Quantum election scheme based on anonymous quantum key distribution. Chinese Physics B, 2012. 21(8): p. 080301.
    24. Tian, J.-H., J.-Z. Zhang, and Y.-P. Li, A Voting Protocol Based on the Controlled Quantum Operation Teleportation. International Journal of Theoretical Physics, 2016. 55(5): p. 2303-2310.
    25. Chong, S.-K. and T. Hwang, Quantum key agreement protocol based on BB84. Optics Communications, 2010. 283(6): p. 1192-1195.
    26. Liu, L.-L. and T. Hwang, Controlled probabilistic quantum key distribution using a ground state. Quantum Information Processing, 2015. 14(3): p. 989-1003.
    27. Luo, Y.-P. and T. Hwang, Arbitrated quantum signature of classical messages without using authenticated classical channels. Quantum information processing, 2014. 13(1): p. 113-120.
    28. Yang, Y.-G., et al., Arbitrated quantum signature scheme based on cluster states. Quantum Information Processing, 2016: p. 1-11.
    29. Shi, W.-M., et al., A new quantum blind signature with unlinkability. Quantum Information Processing, 2015. 14(8): p. 3019-3030.
    30. Cao, H.-J., et al., A Electronic Voting Scheme Achieved by Using Quantum Proxy Signature. International Journal of Theoretical Physics, 2016: p. 1-8.
    31. Guo, Y., Y. Feng, and G. Zeng, Quantum anonymous voting with unweighted continuous-variable graph states. Quantum Information Processing, 2016: p. 1-19.

    無法下載圖示 校內:2021-08-15公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE