Skip to main content
Entropy logoLink to Entropy
. 2021 Sep 30;23(10):1294. doi: 10.3390/e23101294

A Quantum Dual-Signature Protocol Based on SNOP States without Trusted Participant

Kejia Zhang 1,2,3, Xu Zhao 1, Long Zhang 1,*, Guojing Tian 4, Tingting Song 5,6
Editor: Rosario Lo Franco
PMCID: PMC8534359  PMID: 34682018

Abstract

Quantum dual-signature means that two signed quantum messages are combined and expected to be sent to two different recipients. A quantum signature requires the cooperation of two verifiers to complete the whole verification process. As an important quantum signature aspect, the trusted third party is introduced to the current protocols, which affects the practicability of the quantum signature protocols. In this paper, we propose a quantum dual-signature protocol without arbitrator and entanglement for the first time. In the proposed protocol, two independent verifiers are introduced, here they may be dishonest but not collaborate. Furthermore, strongly nonlocal orthogonal product states are used to preserve the protocol security, i.e., no one can deny or forge a valid signature, even though some of them conspired. Compared with existing quantum signature protocols, this protocol does not require a trusted third party and entanglement resources.

Keywords: quantum dual-signature, strongly nonlocal orthogonal product states, untrusted third party

1. Introduction

With the development of the Internet, network communications have become more and more frequent in daily life. Therefore, it is particularly important to improve the security of network communications. Digital signatures are not only widely employed to authenticate the identity of communication participants, but also ensure the integrity of legal messages. For example, encrypting and signing the transmitted messages, verifying the identity of all parties, are necessary to ensure the security of network communications. As we know, the applied classic digital signature protocols are based on computational complexity, such as the decomposition of a large prime number. However, with the development of quantum algorithms [1], classic cryptographic protocols are becoming increasingly insecure. Fortunately, various quantum cryptography protocols, such as quantum key distribution (QKD) [2,3,4], controlled quantum teleportation [5,6,7,8,9,10], quantum secret sharing [11,12,13,14,15] and quantum secure direct communication [16,17,18,19], can be implemented on quantum networks [20,21,22,23,24]. Since their security is based on the laws of quantum mechanics, they are immune to the attacks on quantum computers. During them, designing digital signature protocols based on quantum technology is an important research aspect of quantum cryptographic protocols.

In 2001, Gottesman et al. [25] first proposed a quantum digital signature based on the fundamental principles of quantum physics, i.e., a quantum analogue of one-way functions which required O(m) qubits is used to encrypt an m-bit message. In 2002, Zeng et al. [26] put forward a signature protocol based on the GHZ states, whose realization depends upon a trust arbitrator. Since then, many variations of quantum signature protocols have been presented. For example, Li et al. [27] proposed an arbitrated quantum signature protocol using Bell states instead of GHZ states. Zou et al. [28] presented an arbitrated quantum signature protocol without using entangled states. In 2016, Liu et al. [29] proposed a quantum dual-signature protocol, which combines two signed messages expected to be sent to two different recipients. In their protocol, the entanglement swapping with coherent states is applied. Compared to classic signatures, the quantum signature which involves quantum algorithms, could be more secure and efficient. As we know, quantum signatures also have wide applications in the ecommerce system as classic signatures.

All these protocols are based on the assumption that a trusted third party exists in the quantum network, though this is not practical. In 2015, Kang et al. [30] first proposed a controlled mutual quantum entity authentication using entanglement swapping by introducing an untrusted third party. However, the controller may perform an internal attack, because the others do not test the correlation of the entangled state. In order to prevent this security loophole, a checking procedure was added to confirm the correlation of the entangled state (see Ref. [31]). Nevertheless, Wang et al. [32] pointed out that there is still a secure flaw in Kang’s improved protocol [31], that is, the untrusted third party can obtain the shared key between the other participants without being detected. In 2016, Li et al. [33] proposed a secure quantum blind dual-signature scheme without arbitrators. It does not rely on an arbitrator in the verification phase as the previous quantum signature schemes do. The security is guaranteed by the entanglement in quantum information processing. Compared with the existing quantum signature protocols, it reduces the over rights of the third party in verification. However, the research on quantum digital signatures without arbitrators is still in its infancy.

The existing quantum digital signatures without arbitrators are usually implemented by entangled states. As we know, the preparation of entanglement in experiments is difficult. Therefore, it is very urgent to propose a more practical quantum signature protocol without arbitrators. Recently, the expression of quantum nonlocality has attracted more attention. In 2019, Halder et al. [34] first proposed a strong quantum nonlocality without entanglement and presented two explicit strongly nonlocal sets of quantum states in C3C3C3 and C4C4C4 quantum systems. For the sake of simplicity, we define these states as SNOP states. Compared with normal nonlocal orthogonal product states, SNOP states have strong quantum nonlocality for tripartite, i.e., they are locally irreducible in every bipartition. In this situation, if the private messages are encoded into SNOP states, the security of the private messages is ensured. This means that the attacker cannot determine the accurate whole state even if they obtain two particles of the SNOP states. A secure quantum signature protocol has to meet at least two requirements, i.e., non-forgery and non-repudiation. In this case, we propose a quantum dual-signature protocol based on SNOP states without a trusted third party. The security of our protocol is guaranteed by the secret encryption algorithm [35] and SNOP states. The encryption algorithm is mainly used to resist external attackers. Furthermore, each bipartite of the SNOP states is locally irreducible to resist internal attacks. In this case, the security of our protocol is shown, i.e., neither an external attacker nor an internal one can forge a signature. Moreover, no one can deny the signature.

The rest of the paper is arranged as follows: In Section 2, some preliminary theories are introduced. In Section 3, we describe the quantum dual-signature protocol including the initializing phase, signing phase and verification phase. The security of our protocol is analyzed in Section 4. Finally, a short conclusion is given in Section 5.

2. Preliminaries

In this section, we describe an encryption algorithm—Key-Controlled-‘I’QOTP. Then, a set of SNOP states to encode messages are introduced.

2.1. Key-Controlled-‘I’QOTP

As we know, the quantum one time pad (QOTP) is an important way to generate quantum signatures [36]. However, Gao et al. [37] pointed out that there exist some security problems in these protocols. In the above security analysis of AQS protocols, one of the most basic assumptions is that the signature is generated by encrypting bitwise messages. In this case, the receiver may forge a legal signature by performing a corresponding operator to the signature and message without secret keys. In 2013, Zhang et al. [35] presented two types of improved encryption algorithms, called Key-Controlled-‘I’QOTP and Key-Controlled-‘T’QOTP, to prevent forgery attacks effectively. Here, we briefly introduce Key-Controlled-‘I’QOTP.

Firstly, a set W with four Clifford operators is introduced to encrypt the message |P to obtain |S. Secondly, the two bits Ki and K2ni+1 in the shared key string K are appointed to determine the corresponding operator in Table 1. Moreover, the message |P is encrypted into |S in the form of Equation (1).

|S=i=1nσxk2iσzk2i1WKiK2ni+1|P (1)

Table 1.

Corresponding encryption operators in “Key-Controlled-‘I’QOTP”.

KiK2ni+1 Encryption Operator
00 W00=12(σx+σz)
01 W01=12(σy+σz)
10 W10=12(I+iσxiσy+iσz)
11 W11=12(I+iσx+iσy+iσz)

Here, we take n=1, i=1, |P=α|0+β|1 and K1K2=00 as an example to demonstrate how to encrypt quantum states using secret keys. This is the way to generate quantum signatures in subsequent protocols.

|S=i=11σxk2σzk1WK1K2α|0+β|1=σx0σz0W00α|0+β|1=12|01|+|10|+|00||11|α|0+β|1=12α|1+α|0+β|0β|1=12α+β|0+αβ|1 (2)

Zhang et al. proved that this encryption algorithm can be applied to generate signatures which cannot be forged by the receiver. Therefore, in order to ensure security, Key-Controlled-‘I’QOTP is used in the following quantum dual-signature protocol.

2.2. SNOP States

In order to show our protocol, a type of SNOP states is introduced.

|1|2|1±2,|2|1±2|1,|1±2|1|2|1|3|1±3,|3|1±3|1,|1±3|1|3|2|3|1±2,|3|1±2|2,|1±2|2|3|3|2|1±3,|2|1±3|3,|1±3|3|2|1|1|1,|2|2|2,|3|3|3 (3)

In Ref. [34], these states are proved to be locally irreducible in all bipartitions. Since local irreducibility is a sufficient condition for strong nonlocality, these states are strongly nonlocal. In this situation, as the messages are encoded into SNOP states, the security of the private messages is ensured. This means that the attacker cannot determine the accurate forms even if they obtain two particles of the SNOP states.

3. Quantum Dual-Signature Protocol with SNOP States

In this section, a quantum dual-signature protocol is given. Firstly, the identity of the participants and the process of the protocol are described in Section 3.1. Then, the specific protocol process is divided into the following three phases: the initializing phase, signing phase and verification phase.

3.1. Brief Description

There exist three roles in our protocol:

  1. Alice is the applicant and signer;

  2. Bob is the first verifier of the message;

  3. Charlie is the second verifier.

When the applicant Alice needs to warrant a document, she first signs the application document; then, she sends the document to the first verifier Bob to verify one part of the document; next, Bob sends it to Charlie to verify the other part. The process of this protocol can be briefly seen in Figure 1.

Figure 1.

Figure 1

Process of the dual-signature protocol.

3.2. Initializing Phase

Step I1 (Secret Key Assignment): Alice shares the two keys’ sequences KAB and KAC with Bob and Charlie, respectively. Bob shares the key sequence KBC with Charlie. This can be achieved with the quantum key distribution (QKD) technique [2,3,4].

Step I2 (Message Encoding): The message M is divided into n groups, M=M1||M2||||Mn; here Mt is a 4-bit of a classical bit sequence, where t=1,2,3,,n. Alice encodes each Mt to a quantum sequence |S with the 16 states in Table 2; the remaining 11 states are used to detect eavesdropping in Table 3.

Table 2.

SNOP states used to encrypt messages.

Message States Message States
Mt=0000 |φ1=|1|2|1+2 Mt=1111 |φ9=|1|2|12
Mt=0001 |φ2=|1|3|1+3 Mt=1110 |φ10=|1|3|13
Mt=0010 |φ3=|2|3|1+2 Mt=1101 |φ11=|2|3|12
Mt=0100 |φ4=|3|2|1+3 Mt=1011 |φ12=|3|2|13
Mt=1000 |φ5=|1+2|1|2 Mt=0111 |φ13=|12|1|2
Mt=1001 |φ6=|1+3|1|3 Mt=0110 |φ14=|13|1|3
Mt=1010 |φ7=|1+2|2|3 Mt=0101 |φ15=|12|2|3
Mt=1100 |φ8=|1+3|3|2 Mt=0011 |φ16=|13|3|2

Table 3.

SNOP states used to detect eavesdropping.

Decoy State
|φ17=|2|1+2|2 |φ18=|2|12|2
|φ19=|3|1+3|1 |φ20=|3|13|1
|φ21=|3|1+2|2 |φ22=|3|12|2
|φ23=|2|1+3|3 |φ24=|2|13|3
|φ25=|1|1|1 |φ26=|2|2|2
|φ27=|3|3|3

Step I3 (Generating Quantum Sequence): Alice generates three identical sequences |S, where the first sequence is denoted by |Sa, the second one is |Sb and the last one is |Sc. By picking out each particle of above sequences, the corresponding quantum sequences |S1a, |S2a, |S3a, |S1b, |S2b, |S3b, |S1c, |S2c and |S3c are generated.

For example, we suppose that |S=|φ1|φ2|φ3|φ4|φ13|φ14|φ15|φ16. Then, the specific forms of |Sa, |Sb and |Sc are depicted in Equation (4).

|Sa=|1|1|2|3|12|13|12|13|Sb=|2|3|3|2|1|1|2|3|Sc=|1+2|1+3|1+2|1+3|2|3|3|2 (4)

3.3. Signing Phase

Step S (Sending Sequence to Bob): Firstly, Alice encrypts |S3a and |S3b with KAB to obtain |S3a¯ and |S3b¯; then, she encrypts |S1c, |S3c, |S3a¯ and |S3b¯ with KAC to obtain SAC.

SAC=EKAC{|S1c,|S3c,|S3a¯,|S3b¯} (5)

Secondly, Alice encrypts |S2a and |S2c with KAC to obtain |S2a˜ and |S2c˜; then, she encrypts |S1a, |S1b, |S2a˜, |S2b, |S2c˜ and SAC with KAB to obtain SAB as her signature. Finally, she inserts the decoy states randomly in SAB to obtain SAB and sends it to Bob. The symbolic representation can be seen in Table 4.

SAB=EKAB{|S1a,|S1b,|S2a˜,|S2b,|S2c˜,SAC} (6)

Table 4.

Symbolic representation.

Sequence Signature
|S2a˜ EKAC{|S2a}
|S2c˜ EKAC{|S2c}
|S3a¯ EKAB{|S3a}
|S3b¯ EKAB{|S3b}

3.4. Verification Phase

Step V1 (Detect Eavesdropping): After Bob announces that he has received the sequences SAB, Alice tells Bob the positions and the initial states of the decoy particles. Then, Bob measures each of the decoy particles with the corresponding basis and compares the measurement outcome with its initial state to check for eavesdropping. If the error probability is within a certain threshold, Bob recovers the sequences SAB; otherwise, he aborts the protocol.

Step V2 (Bobs Verification of the First Stage): Bob decrypts SAB and verifies whether |S1a is equal to |S1b with SWAP operations [38,39,40]. Here, VB1 represents the results.

DKAB{SAB}={|S1a,|S1b,|S2a˜,|S2b,|S2c˜,SAC} (7)
VB1=1,|S1a=|S1b0,|S1a|S1b (8)

If VB1=0, he rejects the quantum signature directly; otherwise, he sends SB to Charlie.

SB=EKBC{|S2a˜,|S2c˜,SAC} (9)

Step V3 (Charlies Verification of the First Stage): Charlie decrypts SB, verifies whether |S2a is equal to |S2c and generates VC.

DKBC{SB}={|S2a˜,|S2c˜,SAC} (10)
DKAC{|S2a˜,|S2c˜}={|S2a,|S2c} (11)
VC=1,|S2a=|S2c0,|S2a|S2c (12)

If VC is equal to 0, Charlie will reject the quantum signature directly; otherwise, he will decrypt SAC and send SC to Bob.

DKAC{SAC}={|S1c,|S3c,|S3a¯,|S3b¯} (13)
SC=EKBC{|S3a¯,|S3b¯} (14)

Step V4 (BobsVerification of the Second Stage): Bob first decrypts SC with KBC and KAB; then, he verifies whether |S3a is equal to |S3b and generates VB2.

DKBC{SC}=|S3a¯,|S3b¯ (15)
DKAB{|S3a¯,|S3b¯}=|S3a,|S3b (16)
VB2=1,|S3a=|S3b0,|S3a|S3b (17)

If VB2 is equal to 0, Bob will reject the quantum signature directly; otherwise, he will recover the sequence |S by |S1b, |S2b and |S3b to obtain mjb according to the rule in Table 5.

Table 5.

Verifier’s measurement rules.

Message Bases
Mt=0000|φ1=|1|2|1+2
Mt=1111|φ9=|1|2|12
{|1,|2,|3}1
{|1,|2,|3}2
{|1+2,|12,|3}3
Mt=0001|φ2=|1|3|1+3
Mt=1110|φ10=|1|3|13
{|1,|2,|3}1
{|1,|2,|3}2
{|1+3,|13,|2}3
Mt=0010|φ3=|2|3|1+2
Mt=1101|φ11=|2|3|12
{|1,|2,|3}1
{|1,|2,|3}2
{|1+2,|12,|3}3
Mt=0100|φ4=|3|2|1+3
Mt=1011|φ12=|3|2|13
{|1,|2,|3}1
{|1,|2,|3}2
{|1+3,|13,|2}3
Mt=1000|φ5=|1+2|1|2
Mt=0111|φ13=|12|1|2
{|1+2,|12,|3}1
{|1,|2,|3}2
{|1,|2,|3}3
Mt=1001|φ6=|1+3|1|3
Mt=0110|φ14=|13|1|3
{|1+3,|13,|2}1
{|1,|2,|3}2
{|1,|2,|3}3
Mt=1010|φ7=|1+2|2|3
Mt=0101|φ15=|12|2|3
{|1+2,|12,|3}1
{|1,|2,|3}2
{|1,|2,|3}3
Mt=1100|φ8=|1+3|3|2
Mt=0011|φ16=|13|3|2
{|1+3,|13,|2}1
{|1,|2,|3}2 {|1,|2,|3}3

Step V5 (Charlies Verification of the Second Stage): Similarly, Charlie recovers the sequence |S according to |S1c, |S2c and |S3c, by the rules in Table 5, to obtain mjc. If mjb=mjc, Charlie will announce it is the valid signature of mj; otherwise, he will reject this signature. The process can be briefly seen in Figure 2.

Figure 2.

Figure 2

Brief summary of protocol process.

4. Security and Efficiency Analysis

As mentioned above, a secure quantum signature protocol has to meet at least two requirements, i.e., non-forgery and non-repudiation. In our protocol, the above requirements are completely satisfied. The security of our protocol is guaranteed by the secret encryption algorithm Key-Controlled-‘I’QOTP and SNOP states. The encryption algorithm is mainly used to resist external attackers. Furthermore, each bipartite of the SNOP states is locally irreducible to resist internal attacks. In this case, the security of our protocol is shown, i.e., neither an external attacker nor an internal one can forge a signature. Moreover, no one can deny the signature. The specific analysis can be seen in the following subsections.

4.1. Non-Forgery

4.1.1. Resistance to Outside Attacks Based on Encryption Algorithm

(i) Eve Forges Alices Signature.

In order to forge Alice’s signature, Eve has to intercept the sequences in Step S. Then, he could change Alice’s signature and replace SAB with SAB. However, since the original keys are shared with QKD, it is impossible for her to succeed. If he attempts to forge Alice’s signature without KAB, he will perform an operator corresponding to the signature and message. In our protocol, as Key-Controlled-‘I’QOTP is used to generate signature SAB, he would not be able to identify the forms of encryption operators except for Alice and Bob, as shown in Table 6.

Table 6.

The attacker’s possible encryption, decryption and possible forgery attacks are under Key-Controlled-‘I’QOTP.

Encryption Eve’s Possible Decryptions Eve’s Forgery of Operation Signature
I Wi+QWi 00 01 10 11
σz Wi+σzQσzWi σz σz σx σy σz
σx Wi+σxQσxWi σx σy σz σz σx
σy Wi+σyQσyWi σy σx σy σx σy

From Table 6, it can be seen that, if Eve wants to forge one qubit of Alice’s signature with σx or σy, the probability of success will be 13. Moreover, the probability will be 12 if the forgery operation is σz. Furthermore, if the length of the message is m, the probability PE of Eve’s forgery’s success will be

PE=(13)k(12)mk (18)

where k(0km,0mn) represents the total number of qubits which Eve wants to forge the sequence by σx and σy; (mk) represents the number of qubits forged by σz. With this encryption algorithm, Eve can be detected during Bob’s verification phase.

(ii) Eve Forges Bobs Verification Results.

For Eve to intercept the sequences in Step V2, he has to change the sequence SB with SB and send it to Charlie. Similarly, Eve cannot know the secret key KBC. Therefore, Eve’s forgery will be discovered by Charlie once Eve changes only a small part of SB. Similarly, if Eve forges Charlie’s verification results, similarly, his forgery will be found by Bob.

4.1.2. Resistance to Inside Attacks Based on SNOP States

Above, we guarantee that two verifiers are not dishonest at the same time. This assumption is satisfied with the actual situation. In fact, if both verifiers are dishonest, the protocol will be insecure and impractical. Here, we discuss the dishonesty of the verifier, specifically in the case in which one verifier wants to forge a signature to evade the verification of the other one.

According to our analysis above, the encryption algorithm can resist some forgery attacks, but, for internal attackers who know the secret key, the security needs to be further discussed as follows. Here, SNOP states provides a nature property for resisting internal attacks, i.e., they are locally irreducible in every bipartition. This means that the attacker cannot determine the accurate whole state even if they obtain two particles of the SNOP states. The specific analysis can be seen in the following subsections.

(i) Bobs Forgery.

This is different from Eve’s forgery of Alice’s signature; Bob does not need to intercept the sequences because he has the secret key KAB. If he attempts to replace SAC with SAC in Step V2, his forgery will not succeed. Since the sequences SAC are generated by Key-Controlled-‘I’QOTP with the key KAC, Bob cannot identify the forms of encryption operators, except for Alice and Charlie. Similar to the analysis above, Bob’s forgery will be discovered by Charlie in Step V3.

Based on the analysis above, we assume that Bob attempts to restore all the SNOP states by the sequences |S1b and |S2b. He can only choose the measurement basis randomly. There are three possible cases seen in Table 7. The probability that he chooses any basis is 13. From Table 7, we can deduce that the probability of choosing the correct measurement basis and obtain one bit, as shown in Equation (19).

Table 7.

Measurement basis and possible measurement results of attackers.

State |1 |2 |3 |1+2 |12 |1+3 |13
A1={|1,|2,|3} 1 1 1 0 0 0 0
A2={|1+2,|12,|3} 0 0 1 1 1 0 0
A3={|1+3,|13,|2} 0 1 0 0 0 1 1
P=13×1+13×2+13×2+13×1+13×1+13×1+13×116=316 (19)

For the n length of the quantum sequence, it is not difficult to see that the probability of Bob’s successful attack P tends to be zero with the increase in n in Equation (20).

P=Pn=(316)n (20)

(ii) Charlies Forgery.

We assume Charlie tries to modify |S3a¯ and |S3b¯ according to the sequence |S3c in his hands to make |S3a and |S3b equal. Similarly, Charlie cannot identify the forms of the encryption operators without the key KAB. If |S3a|S3b, Charlie’s forgery will be discovered by Bob in Step V4. The process can be briefly seen in Figure 3.

Figure 3.

Figure 3

The process of verification phase.

4.2. Non-Repudiation

Alice could attempt to deny her signature in two ways. One is directly denying her signature. Here Alice’s signatures SAB and SAC are generated by KAB and KAC, only known to Bob and Charlie. Once Bob and Charlie have verified the validity of the signatures, she will not be able to deny them. Moreover, since Key-Controlled-‘I’QOTP is used, no one can find the corresponding location without knowing KAB and KAC. If |S1a=|S1b and |S2a=|S2c, it will be impossible for Alice to deny.

The other way is that Alice denied the signature after Bob verified it. If mjb=mjc, Bob and Charlie will be able to judge whether Alice denies. The sequences |S3a¯ and |S3b¯ are encrypted with the key KAB and the key KAB is generated by Key-Controlled-‘I’QOTP. Therefore, Charlie cannot know the secret key KAB. If Charlie attempts to modify the sequence, Bob will find this attack in Step V4. Similarly, Alice will not succeed in denying the signature after Charlie’s verification.

5. Discussion and Conclusions

We summarize and compare our protocol with the quantum signature protocols proposed above in Table 8. Compared with the existing quantum signature protocols, our protocol does not need a trusted third party and entanglement resources for the first time.

Table 8.

Comparison among some different quantum signature protocols.

Protocol Resources Trust Third Party Contribution
Zeng et al. [26] GHZ states Yes Arbitrated quantum signature (AQS) protocol is proposed for the first time.
Li et al. [27] Bell states Yes AQS protocol first proposed using Bell states instead of GHZ states.
Zou et al. [28] Single photon Yes AQS protocol without entangled resources is proposed for the first time.
Liu et al. [29] Coherent states Yes Innovation of quantum dual- signature.
Kang et al. [30] GHZ states No The signature protocol without arbitrator is proposed for the first time.
Kang et al. [31] GHZ-like states No Further improvement on the protocol in Ref. [30].
Wang et al. [32] GHZ-like states, Bell states No Further improvement on the protocol in Ref. [31].
Li et al. [33] Bell states No A novel quantum signature protocol without arbitrator is proposed for the first time.
Our protocol SNOP states No A quantum signature protocol without arbitrator and entangled resources is proposed for the first time.

Comparing with the existing quantum signature protocols, the signature of our protocol requires the cooperation of two verifiers to complete the whole verification process without an arbitrator. In this case, the function has wide applications in practical management. By introducing SNOP states, the present protocol seems more efficient and easier to be realized in noisy intermediate-scale quantum (NISQ) devices, as no entangled resources are required. According to our analysis, the protocol based on SNOP states is immune to attacks from the inside and outside. In other words, the attacker cannot determine the accurate whole state even if they obtain two particles of the SNOP states. Furthermore, we give a potential application for the SNOP states and put forward a series of ideas. We think SNOP states could also be applied to electronic payments, voting systems and so on. Moreover, we believe that SNOP states must have better application scenarios in the future. Finally, we hope that our results are instructive to further research on other quantum cryptographic protocols.

Abbreviations

The following abbreviations are used in this manuscript:

QKD quantum key distribution
SNOP strongly nonlocal orthogonal product
QOTP quantum one time pad
AQS arbitrated quantum signature
NISQ noisy intermediate-scale quantum

Author Contributions

Conceptualization, X.Z. and K.Z.; methodology, X.Z.; software, X.Z.; validation, X.Z., K.Z., L.Z., G.T. and T.S.; writing—original draft preparation, X.Z.; writing—review and editing, X.Z., K.Z. and L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant No. 61802118 and No. 61801459, the National Postdoctoral Program for Innovative Talent Grant No. BX20190335, the Natural Science Foundation of Heilongjiang Province under Grant No. YQ2020-F013, the University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province under Grant No. UNPYSCT-2018015, the Anhui Initiative in Quantum Information Technologies Grant No. AHY150100, the Central Universities Grant No. 21620433, the Guangxi Key Laboratory of Cryptography and Information Security Grant No. GCIS201922 and the open Foundation of State key Laboratory of Networking and Switching Technology (BUPT) under Grant No. SKLNST-2018-1-07. The Outstanding Youth Fund of Heilongjiang University supported Kejia Zhang, the Heilongjiang University Innovation Fund Grant No.YJSCX2021-082HLJU.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Footnotes

Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Shor P.W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 1999;41:303–332. doi: 10.1137/S0036144598347011. [DOI] [Google Scholar]
  • 2.Bennet C.H., Brassard G. An update on quantum cryptography. LNCS. 1984;196:475–480. [Google Scholar]
  • 3.Ekert A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991;67:661. doi: 10.1103/PhysRevLett.67.661. [DOI] [PubMed] [Google Scholar]
  • 4.Gong L.H., Song H.C., He C.S., Liu Y., Zhou N.R. A continuous variable quantum deterministic key distribution based on two-mode squeezed states. Phys. Scr. 2014;89:035101. doi: 10.1088/0031-8949/89/03/035101. [DOI] [Google Scholar]
  • 5.Zhao Z., Chen Y.A., Zhang A.N., Yang T. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature. 2004;430:54–58. doi: 10.1038/nature02643. [DOI] [PubMed] [Google Scholar]
  • 6.Deng F.G., Li C.Y., Li Y.S., Zhou H.Y. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys. Rev. A. 2005;72:022338. doi: 10.1103/PhysRevA.72.022338. [DOI] [Google Scholar]
  • 7.Gao T.F., Yan L., Wang Z.X. Controlled quantum teleportation and secure direct communication. Chin. Phys. 2005;14:893–897. [Google Scholar]
  • 8.Yang K., Huang L., Yang W., Song F. Quantum teleportation via GHZ-like state. Int. J. Theor. Phys. 2009;48:516–521. doi: 10.1007/s10773-008-9827-6. [DOI] [Google Scholar]
  • 9.Wang X.W., Su Y.H., Yang G.J. Controlled teleportation against uncooperation of part of supervisors. Quantum Inf. Process. 2009;8:319–330. doi: 10.1007/s11128-009-0107-z. [DOI] [Google Scholar]
  • 10.Wang T.Y., Wen Q.Y. Controlled quantum teleportation with Bell states. Chin. Phys. B. 2011;20:040307. doi: 10.1088/1674-1056/20/4/040307. [DOI] [Google Scholar]
  • 11.Karlsson A., Koashi M., Imoto N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A. 1999;59:162–168. doi: 10.1103/PhysRevA.59.162. [DOI] [Google Scholar]
  • 12.Xiao L., Long G.L., Deng F.G., Pan J.W. Efficient multiparty quantum–secret–sharing schemes. Phys. Rev. A. 2004;69:052307. doi: 10.1103/PhysRevA.69.052307. [DOI] [Google Scholar]
  • 13.Deng F.G., Li X.H., Li C.Y., Zhou P. Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein–Podolsky–Rosen pairs. Phys. Rev. A. 2005;72:044301. doi: 10.1103/PhysRevA.72.044301. [DOI] [Google Scholar]
  • 14.Deng F.G., Li X.H., Zhou H.Y. Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A. 2005;72:044302. doi: 10.1103/PhysRevA.72.044302. [DOI] [Google Scholar]
  • 15.Li X.H., Zhou P., Li C.Y. Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state. J. Phys. B At. Mol. Opt. Phys. 2006;39:1975–1983. doi: 10.1088/0953-4075/39/8/015. [DOI] [Google Scholar]
  • 16.Gao T., Yan F.L., Wang Z.X. Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A. 2005;38:5761. doi: 10.1088/0305-4470/38/25/011. [DOI] [Google Scholar]
  • 17.Wang C., Deng F., Long G. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt. Commun. 2005;253:15–20. doi: 10.1016/j.optcom.2005.04.048. [DOI] [Google Scholar]
  • 18.Lee H., Lim J., Yang H. Quantum direct communication with authentication. Phys. Rev. A. 2006;73:042305. doi: 10.1103/PhysRevA.73.042305. [DOI] [Google Scholar]
  • 19.Jin X.R., Ji X., Zhang Y.Q., Zhang S. Three-party quantum secure direct communication based on GHZ states. Phys. Rev. A. 2006;354:67–70. doi: 10.1016/j.physleta.2006.01.035. [DOI] [Google Scholar]
  • 20.Tang Y.L., Yin H.L., Zhao Q., Liu H. Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X. 2016;6:011024. doi: 10.1103/PhysRevX.6.011024. [DOI] [Google Scholar]
  • 21.Hong C.H., Heo J., Khym G.L., Lim J.I. N quantum channels are sufficient for multi-user quantum key distribution protocol between n users. Opt. Commun. 2010;283:2644–2646. doi: 10.1016/j.optcom.2010.02.037. [DOI] [Google Scholar]
  • 22.Nguyen D.M., Kim S. Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes. Int. J. Theor. Phys. 2019;58:2043–2053. doi: 10.1007/s10773-019-04098-4. [DOI] [Google Scholar]
  • 23.Hong C.H., Heo J., Lim J.I., Yang H.J. Quantum secure direct communication network with hyperentanglement. Chin. Phys. B. 2014;23:090309. doi: 10.1088/1674-1056/23/9/090309. [DOI] [Google Scholar]
  • 24.Li J., Chen X.B., Xu G., Yang Y.X. Perfect quantum network coding independent of classical network solutions. IEEE Commun. Lett. 2015;19:115–118. doi: 10.1109/LCOMM.2014.2379253. [DOI] [Google Scholar]
  • 25.Gottesman D., Chuang I. Quantum Digital Signature. arXiv. 20010105032 [Google Scholar]
  • 26.Zeng G., Keitel C.H. Arbitrated quantum signature scheme. Phys. Rev. A. 2002;65:042312. doi: 10.1103/PhysRevA.65.042312. [DOI] [Google Scholar]
  • 27.Li Q., Chan W.H., Long D.Y. Arbitrated quantum signature scheme using Bell states. Phys. Rev. A. 2009;75:054307. doi: 10.1103/PhysRevA.79.054307. [DOI] [Google Scholar]
  • 28.Zou X.F., Qin D.W. Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A. 2010;82:042325. doi: 10.1103/PhysRevA.82.042325. [DOI] [Google Scholar]
  • 29.Liu J.L., Shi R.H., Shi J.J., Lv G.L., Guo Y. Quantum dual signature scheme based on coherent states with entanglement swapping. Chin. Phys. B. 2016;25:080306. doi: 10.1088/1674-1056/25/8/080306. [DOI] [Google Scholar]
  • 30.Kang M.S., Hong C.H., Heo J., Lim J.I. Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B. 2015;24:120–128. doi: 10.1088/1674-1056/24/9/090306. [DOI] [Google Scholar]
  • 31.Kang M.S., Heo J., Hong C.H., Yang H.J. Controlled mutual quantum entity authentication with an untrusted third party. Quantum. Inf. Process. 2018;17:159. doi: 10.1007/s11128-018-1927-5. [DOI] [Google Scholar]
  • 32.Wang Q., Zhang S., Wang S.L., Shi R.H. Comment on “Controlled mutual quantum entity authentication with an untrusted third party”. Quantum. Inf. Process. 2020;19:125. doi: 10.1007/s11128-020-2611-0. [DOI] [Google Scholar]
  • 33.Li W., Shi R.H., Huang D.Z., Shi J.J., Guo Y. Quantum blind dual-signature scheme without arbitrator. Phys. Scr. 2016;91:035101. doi: 10.1088/0031-8949/91/3/035101. [DOI] [Google Scholar]
  • 34.Halder S., Banik M., Agrawal S. Strong quantum nonlocality without entanglement. Phys. Rev. Lett. 2019;122:040403. doi: 10.1103/PhysRevLett.122.040403. [DOI] [PubMed] [Google Scholar]
  • 35.Zhang K.J., Zhang W.W., Li D. Improving the security of arbitrated quantum signature against the forgery attack. Quantum. Inf. Process. 2013;12:2655–2669. doi: 10.1007/s11128-013-0554-4. [DOI] [Google Scholar]
  • 36.Boykin P.O., Roychowdhury V. Optimal encryption of quantum bits. Phys. Rev. A. 2003;67:645–648. doi: 10.1103/PhysRevA.67.042317. [DOI] [Google Scholar]
  • 37.Gao F., Qin S.J., Guo F.Z., Wen Y.Q. Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A. 2011;84:022344. doi: 10.1103/PhysRevA.84.022344. [DOI] [Google Scholar]
  • 38.Zhang G.F., Zhou Y. Interplay between the Dzyaloshinskii-Moriya anisotropic antisymmetric interaction and the SWAP operation in a two-qubit Heisenberg model. Phys. Lett. A. 2007;370:136–138. doi: 10.1016/j.physleta.2007.05.051. [DOI] [Google Scholar]
  • 39.Collins D., Linden N., Popescu S. Nonlocal content of quantum operations. Phys. Lett. A. 2001;64:032302. doi: 10.1103/PhysRevA.64.032302. [DOI] [Google Scholar]
  • 40.Zhou Y., Zhang G.F. Swap operation in the presence of Zeeman inhomogeneity in coupled quantum dots. Solid State Commun. 2014;178:28–32. [Google Scholar]

Articles from Entropy are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES