Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2015 Mar 18;5:9231. doi: 10.1038/srep09231

Security of quantum digital signatures for classical messages

Tian-Yin Wang 1,2,a, Xiao-Qiu Cai 1, Yan-Li Ren 3, Rui-Ling Zhang 4
PMCID: PMC4363884  PMID: 25782417

Abstract

Quantum digital signatures can be used to authenticate classical messages in an information-theoretically secure way. Previously, a novel quantum digital signature for classical messages has been proposed and gave an experimental demonstration of distributing quantum digital signatures from one sender to two receivers. Some improvement versions were subsequently presented, which made it more feasible with present technology. These proposals for quantum digital signatures are basic building blocks which only deal with the problem of sending single bit messages while no-forging and non-repudiation are guaranteed. For a multi-bit message, it is only mentioned that the basic building blocks must be iterated, but the iteration of the basic building block still does not suffice to define the entire protocol. In this paper, we show that it is necessary to define the entire protocol because some attacks will arise if these building blocks are used in a naive way of iteration. Therefore, we give a way of defining an entire protocol to deal with the problem of sending multi-bit messages based on the basic building blocks and analyse its security.


Digital signature (DS) is a fundamental cryptographic primitive, which has been frequently used in e-commerce and e-government to ensure both the integrity and the origin of a message. However, the degree of security provided by current classical digital signature (CDS) schemes generally depends on certain unproven assumptions related to the intractability of certain difficult mathematical problems, such as big number factorization problem1 and discrete logarithmic problem2. With the rapid development of quantum computing3, the security of such CDS schemes is seriously challenged.

Fortunately, quantum digital signature (QDS) provides a way of authenticating classical messages with information-theoretic security against forging and repudiation. Gottesman and Chuang introduced the concept of QDS in 2001, and proposed the first QDS scheme for classical messages based on quantum one-way functions4.

Recently, a novel QDS proposal for classical messages was put forth (named C-proposal hereafter), which has been implemented using phase-encoded coherent states of light in experiments5. However, it needs quantum memory like previous proposals, which makes it also unfeasible in practice with current technology. To deal with this problem, Dunjko et al gave the first practical QDS proposal for classical messages, in which quantum memory is no longer required6; in addition, this proposal has been implemented using just standard linear optical components and photodetectors7. Furthermore, Dunjko et al presented another two different QDS protocols for classical messages, which essentially only use the same experimental requirements as quantum key distribution8. Most important of all, in contrast with other DS schemes, this kind of proposals5,6,7,8 have an important advantage: the trusted authorities are not needed any longer.

These QDS proposals5,6,7,8 are basic building blocks, which only deal with the problem of sending single bit messages while no-forging and non-repudiation are guaranteed. For a long multi-bit message, it is only mentioned that the basic building blocks must be iterated, but the iteration of the basic building blocks still does not suffice to define the entire protocol, and therefore there still must be an additional set of rules which stipulate how disputes are resolved, or how validity of a long message is proven and so on.

In this paper, we show that it is necessary to define the entire protocol because some attacks will arise if these basic building blocks are used just in a naive way of iteration. Furthermore, based on the basic building blocks in these proposals5,6,7,8, we propose an entire protocol to deal with the problem of sending multi-bit messages, in which the rules on how to resolve disputes, and how to prove the validity of a multi-bit message and so on are given.

Results

As mentioned above, these QDS proposals5,6,7,8 are basic building blocks, which only deal with the problem of sending single bit messages while no-forging and non-repudiation are guaranteed. For a long multi-bit message, it is only mentioned that the basic building block must be iterated, but the iteration of the basic building block still does not suffice to define the entire protocol. Specifically, some attacks will arise if these building blocks are used to deal with the problem of sending a multi-bit message in a naive way of iteration. Without loss of generality, we take three players' case of C-proposal as an example.

The C-proposal

Before presenting the attacks, let us give a simple introduction of C-proposal, which can be described in Figure 1.

Figure 1. C-proposal.

Figure 1

(1) To sign a single bit (message m = 0 or 1) in the future, Alice generates two sequences Inline graphic and Inline graphic, where Inline graphic. The pair (m, PrivKeym) is called a private key pair for message m. (2) Alice generates two copies of a sequence of coherent states Inline graphic with the coherent phases matching the angles in the sequence PrivKey0, thus Inline graphic, where α is a real positive amplitude. A sequence of such states is called a quantum signature. She sends a copy of the quantum signature to each of Bob and Charlie each, informing them that they correspond to message m = 0. Alice then does analogously for the message m = 1. (3) Bob and Charlie send their copies of the sequences QuantSig0 and QuantSig1 through a multiport, saving the output states in quantum memory, noting which quantum signature corresponds to message m = 0 and which to m = 1. (4) To sign a single bit m with Bob, Alice sends the pair (m, PrivKeym) to Bob over an untrusted channel. To authenticate the signature, Bob generates coherent states of amplitude α with the relative phase defined by the declared private key, and interferes them individually with the states he has in his quantum memory. He monitors the number of photodetection events on his signal null-port arm and confirms the authenticity of the message if the number of photodetection events was below saL. (5) To forward m, Bob forwards to Charlie the pair (m, PrivKeym). Charlie then performs an analogous procedure to Bob, and he accepts the message coming from Alice if his number of photodetection events is below svL.

The analysis of C-proposal

From C-proposal, it can be seen that if its basic building blocks are used to deal with the problem of sending a multi-bit message just in a naive way of iteration, and a signed multi-bit message (M, PrivKeyM) (we will call it a message-signature pair hereafter) will be verified in the way of bit by bit, and there is no correlation among quantum signatures on signed message bits except that their labels are pre-determined and sequential. Furthermore, as mentioned in Ref. 8, a QDS protocol has two stages: a preparation stage (distribution) and a message stage. The distribution stage serves to establish the required classical-quantum (or fully classical) correlations, which can later, in the message stage, be used by the sender to transmit messages to the recipients. Additionally, no further communication with any of the other players is required when the sender (say Alice) sends a message-signature pair to a recipient, and both the transferal and the verification of the message-signature pair should no longer require any feedback from Alice at all; in addition, Alice may send a lot of different message-signature pairs to the recipient and other ones later (in the message stage). Therefore, the verifier Charlie knows neither the length of a signed message nor the initial label of quantum signature for the message sent by the recipient. These will give a chance for a dishonest recipient (say Bob) to forge an integrated message-signature pair by the following known-message attacks.

Forgery attack 1. Suppose that Bob has obtained a valid message-signature pair (M, PrivKeyM) from Alice, where Inline graphic, and Inline graphic, here || denotes the concatenation of bits or bit strings. He chooses some continuous bits from M (e.g., the first half bits) and the corresponding private keys from PrivKeyM, which are denoted as (M′, PrivKeyM), where

graphic file with name srep09231-m1.jpg

and

graphic file with name srep09231-m2.jpg

Then he sends the new message-signature pair (M′, PrivKeyM) to Charlie. It can be seen that the forged message-signature pair (M′, PrivKeyM) is a subset of the valid message-signature pair (M, PrivKeyM) and each signed bit mk is not changed, ikj, i.e., M′ ⊆ M, PrivKeyM ⊆ PrivKeyM. Therefore, each bit-signature pair (mk, Inline graphic) of (M′, PrivKeyM) matches the corresponding quantum signature Inline graphic stored by Charlie, which means Bob's forgery introduces no error and therefore the forged message-signature pair (M′, PrivKeyM) will be accepted by Charlie. For example, suppose that Bob has received a message-signature pair (M, PrivKeyM) from Alice, where M = “don't pay Bob 100$.” then Bob will be able to send Charlie the message M′ (M′ = “pay Bob 100$.”) and the corresponding PrivKeyM to Charlie, claiming that it comes from Alice, where the initial “Don't” is omitted. For M′ ⊆ M, PrivKeyM ⊆ PrivKeyM, Charlie will accept that it comes from Alice and give 100$ to Bob.

Forgery attack 2. Suppose that Bob has obtained two valid message-signature pairs (M1, Inline graphic) and (M2, Inline graphic) from Alice, where Inline graphic, Inline graphic, Inline graphic, and Inline graphic. He chooses some continuous bits from M1 and M2 (e.g., the last half bits of M1 and the first half bits of M2) with their corresponding private keys to form a new message-signature pair (M″, PrivKeyM), where

graphic file with name srep09231-m3.jpg

and

graphic file with name srep09231-m4.jpg

Then he sends the forged message-signature pair (M″, PrivKeyM) to Charlie. Clearly, Inline graphic, Inline graphic, and therefore by similar analysis as that in forgery attack 1, the forged message-signature pair (M″, PrivKeyM) will also pass Charlie's verification.

It is noted that the label of quantum signature for the last bit of M1 and the label of quantum signature for the first bit of M2 must be successive in forgery attack 2, i.e., if the label of quantum signature Inline graphic for Inline graphic is l, then that for Inline graphic must be l + 1, which ensures the labels of quantum signature for the forged message-signature pair (M″, PrivKeyM) are sequential and Bob's deception is not detected by Charlie. Additionally, an outside adversary Eve also can forge a valid message-signature pair when the message-signature pairs are transmitted over an insecure channel. For example, she intercepts them when Alice sends message-signature pairs to a legal recipient, and then she forges a new message-signature pair by the way that Bob does in the above forgery attacks.

As mentioned in Refs. 9, 10, a signature scheme is broken if an opponent can do any of the following with a nonnegligible probability:

Universal forgery (total break), in which he/she can forge a signature for any message.

Selective forgery, in which he/she can forge a signature for a particular message chosen by him/her.

Existential forgery, where he/she can forge a signature for at least one message, but he/she has no control over the message whose signature he obtains, i.e., the message may be random or nonsensical.

However, if the basic building blocks in these proposals5,6,7,8 are used to deal with the problem of sending a multi-bit message in a naive way of iteration, a dishonest recipient or an outside adversary can successfully forge a valid signature for a particular message (chosen from a valid signed message by himself in advance) by the above known-message attacks. Furthermore, the forged message is not random or nonsensical in many cases. For example, if the signed message sent by Alice is a contract, forgery attack 1 allows Bob to delete some items that may be not beneficial to him, and forgery attack 2 allows him to add some new items from another one. Moreover, as a legal replacement for handwritten signatures, DS is not only used to send a message; in addition, the signatory of a signature scheme would like to feel that he/she may sign arbitrary documents prepared by others without fear of compromising his/her security, such as the case of a notary public who must sign more-or-less arbitrary documents on demand10. Therefore, it is a natural and reasonable assumption that an opponent may gain access to valid signatures for any messages of his/her choice (where each message may be chosen in a way that depends on the signatures of previously chosen messages), i.e., we should allow an opponent can do a forgery in the model of adaptive chosen-message attacks; in this case, the opponent can forge a valid signature on any message chosen by himself/herself in advance.

Discussion

It has been shown that the iteration of the basic building blocks of dealing with the problem of sending single bit messages still does not suffice to define the entire protocol. Therefore, it is a necessary and significative work to study the problem of sending multi-bit messages based on the basic building blocks.

As we know, the main tasks of DS are to prevent impersonation, repudiation and message tampering in data transfer, of which the key is to guarantee the integrity of signed messages, i.e., any alteration of a signed message will be detected in the process of verifying. In these proposals5,6,7,8, nobody can forge a valid signature for a single message bit except with a negligible probability. Furthermore, the label of quantum signature for each message bit is predetermined and sequential. Therefore, if the start and the end of a signed message are tagged, i.e., both the initial label and the last one of quantum signatures for the signed message cannot be changed, whereby the integrity of a signed message can be guaranteed. To this goal, one way is that Charlie can acquire the two labels from the signatory Alice before verifying, but it needs some communications or feedbacks between them, which is obviously contradictory to the natural requirement for DS transferal and verification, and another way is that both the start and the end of a signed message are different from the message bits, meanwhile the signatures for them are not to be forged, which can be realized by a special encoding way. In the following, we propose an entire protocol to deal with the problem of sending multi-bit messages, in which the validity of the special encoding way to guarantee the integrity of a signed multi-bit message is proven.

Methods

A method to define an entire protocol for dealing with the problem of sending a multi-bit message is described as follows.

  1. The preparation (distribution) stage is the same as that in these proposals5,6,7,8.

  2. In the message stage, Alice encodes each bit 0(1) of the message M by the codeword 000(010) before signing, i.e., 0 → 000, 1 → 010. Then she adds a special codeword 111 to both the start and the end of the message, in this way, the message M is encoded to Inline graphic. After that, Alice signs each bit Inline graphic of Inline graphic by using the signing block in these proposals5,6,7,8, where Inline graphic is the ith bit of Inline graphic. Finally, she sends the resulting message-signature pair (Inline graphic, Inline graphic) to Bob, where Inline graphic is the concatenation of the signature Inline graphic for the bit Inline graphic of Inline graphic. If each signature Inline graphic for the bit Inline graphic of Inline graphic passes his verification, Bob confirms the authenticity of the message Inline graphic.

  3. In the verifying stage, when receiving the resulting message-signature pair (Inline graphic, Inline graphic) forwarded by Bob, Charlie firstly checks whether all codewords are legal, i.e., all codewords in the message bit sequence Inline graphic should be 000 or 010 except that the start and the end are the codeword 111. If it is not so, Charlie thinks the message M has been tampered with and rejects it. Otherwise, he continues to verify the validity of the signed message M by the same way as that in the corresponding proposal5,6,7,8. If each bit Inline graphic of the signed message Inline graphic passes his verification, Charlie decodes Inline graphic to M and accepts it coming from Alice and has not been tampered with; otherwise, he rejects it.

By this way, if Bob wants to forge a new valid message-signature pair by forgery attack 1 or forgery attack 2, he must find at least one new codeword 111 in the encoding bit sequence Inline graphic while guaranteeing there is no illegal codeword in the forged message. Nevertheless, it is not possible. To draw this conclusion, some necessary lemmas should be proven.

Lemma 1 Suppose that Inline graphic, si ∈ {000, 010}, i = 1, 2, …, n, is a bit sequence, then 111 ∉ S.

The conclusion of this lemma is obvious, but it implies that if each bit 0(1) of a message M is encoded by the codeword 000(010), then it is impossible to appear a codeword 111 in the corresponding encoding sequence. For example, let a message M = 01011001, then the message M is encoded to the bit sequence S = 000010000010010000000010, we cannot find a codeword 111 in the bit sequence S.

Lemma 2 Suppose that Inline graphic, si ∈ {000, 010}, i = 1, 2, …, n, is a bit sequence, it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S except S′ = S.

Proof. By Lemma 1, Inline graphic. In addition, both the first bit and the last one of the codewords 000 and 010 are 0, thus it is impossible to find a new codeword 111 by the way of taking one bit from a message codeword 000 or 010 and two bits from the codeword 111, or taking two bits from a message codeword 000 or 010 and one bit from the codeword 111. Therefore, it is impossible to find a new codeword 111 in the middle of the bit sequence S, and hence we cannot find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S except S′ = S. For example, let S = 111000010010000010111, obviously, there is no codeword 111 in the middle of the bit sequence S, and therefore it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S except S′ = 111000010010000010111.

Lemma 3 Suppose that Inline graphic, Inline graphic, i = 1, 2, …, nj, j = 1, 2, …, l, it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that Inline graphic except S′ = Sj, j = 1, 2, …, l.

Proof. When l = 1, this lemma reduces to Lemma 2.

When l = 2,

graphic file with name srep09231-m5.jpg

in this case, in order to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that Inline graphic, it is necessary to find at least one new codeword 111. By lemma 2 and Formula (5), the new codeword 111 can be only chosen from Inline graphic; if we choose Inline graphic, we must choose Inline graphic as the start codeword, but in the case, S′ = S1; otherwise, there must exist at least one codeword Inline graphic such that Inline graphic. If we choose Inline graphic, whether we choose Inline graphic or Inline graphic as another codeword 111, obviously, there must exist at least one codeword Inline graphic such that Inline graphic; if we choose Inline graphic or Inline graphic, we will face the same difficult. Therefore, in any case, it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S1||S2 except S′ = Sj, j = 1, 2.

Suppose that when n = l − 1, this conclusion is right. When n = l, let Inline graphic, according to the former assumption, it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S except S′ = Sj, j = 1, 2, …, l − 1. By similar analysis as l = 2, we can get that it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S||Sl except Sy = Sj, j = 1, 2, …, l.

As a result, it is impossible to find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that Inline graphic except S′ = Sj, j = 1, 2, …, l. We also can give an example to show that. Let S1 = 111000000111, S2 = 111000010111, S3 = 111010010111, then S1||S2||S3 = 111000000111111000010111 111010010111, from the bit sequence 111000000111111000010111111010010111, it can be seen that we cannot find a sequence Inline graphic, Inline graphic, i = 1, 2, …, k such that S′ ⊆ S1||S2||S3 except S′ = 111000000111, 111000010111 or 111010010111.

From Lemmas 1, 2 and 3, we can conclude that even if an opponent has obtained a lot of message-signature pairs, he/she cannot forge a new valid message-signature pair by forgery attack 1 or forgery attack 2. It is noted that if the opponent can forge a bit-signature pair, he/she can forge a valid message-signature pair by forgery attack 1 or forgery attack 2 because he/she can forge a new codeword 111. Nevertheless, in C-proposal, it has been proven that the probability of forging a bit-signature pair is

graphic file with name srep09231-m6.jpg

By simple computation, we can get that the probability of forging a signature for a new codeword 111 is not more than εforging. Furthermore, the probability εforging is exponentially close to 0 with the increase of the parameter L. Consequently, if a large parameter L is chosen, the probability of forging a signature for a new codeword 111 is negligible.

Therefore, if the basic building blocks of dealing with the problem of sending single bit messages is secure against forging, our method can effectively guarantee the integrity of signed messages in the sense that it can prevent currently known attacks.

Finally, it should be noted that our method does not influence the security of QDS against repudiation, but it may be only one of several possibilities to guarantee the integrity of signed messages.

Author Contributions

T.Y. and R.L. analysed the security of C-proposal and proposed the forgery attacks. T.Y., X.Q. and Y.L. proposed the way to guarantee the integrity of signed messages. T.Y. and X.Q. wrote the main manuscript text. All authors reviewed the manuscript.

Acknowledgments

This work was supported by NSFC (Grant Nos. 61202317, 61272015, 61202367), HASTIT (Grant No. 13HASTIT042), HYKT (Grant No. 2012GGJS-157), NSFS (Grant No. 12ZR1443700), and IPSMEC (Grant No. 14YZ020).

References

  1. Rivest R. L., Shamir A. & Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120–126 (1978). [Google Scholar]
  2. ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469–472 (1985). [Google Scholar]
  3. Shor P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997). [Google Scholar]
  4. Gottesman D. & Chuang I. Quantum digital signatures. Preprint at http://arxiv.org/abs/quant-ph/0105032 (2001).
  5. Clarke P. J. et al. Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light. Nat. Commun. 3, 1174 (2012). [DOI] [PMC free article] [PubMed] [Google Scholar]
  6. Dunjko V., Wallden P. & Andersson E. Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112, 040502 (2014). [DOI] [PubMed] [Google Scholar]
  7. Collins R. J. et al. Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014). [DOI] [PubMed] [Google Scholar]
  8. Dunjko V., Wallden P. & Andersson E. Quantum digital signatures with quantum key distribution components. Preprint at http://arxiv.org/abs/1403.5551 (2014). [DOI] [PubMed]
  9. Gao F., Qin S. J., Guo F. Z. & Wen Q. Y. Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011). [Google Scholar]
  10. Goldwasser S., Micali S. & Rivest R. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 281–308 (1988). [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES