ABSTRACT
Quantum teleportation and entanglement-based quantum blind signature protocol were promising new technologies for secure communication between security service bases. They were secure against a variety of attacks, including eavesdropping, signatory disavowal, verifier denial, and forgery. The protocol worked by using quantum entanglement to create a shared secret state between the security service bases. This shared secret state was then used to generate a quantum signature for each message sent between the bases. The signature was then verified by the receiving base using the shared secret state. Compared to classical blind signature schemes, the main advantages of the quantum entanglement-based quantum blind signature protocol were its information-theoretic security and reduced complexity and noise. However, this protocol also faced some challenges, such as preparing and storing entangled states, performing quantum operations and measurements, and ensuring the trustworthiness of the third party. Despite these challenges, the quantum entanglement-based quantum blind signature protocol was a promising new technology for secure communication between security service like military bases. It had the potential to revolutionize the way that military bases communicated with each other, making it possible to send secure messages without revealing the content or identity of the messages.
- Kalaivani, V., 2023. Enhanced BB84 quantum cryptography protocol for secure communication in wireless body sensor networks for medical applications. Personal and Ubiquitous Computing, 27(3), p.875.Google ScholarDigital Library
- Reutov, A., Tayduganov, A., Mayboroda, V. and Fat'yanov, O., 2023. Security of the decoy-state BB84 protocol with imperfect state preparation. arXiv preprint arXiv:2310.01610.Google Scholar
- Allevi, A., Molteni, F., Zambelli, S. and Bondani, M., 2023. Optimizing the propagation of mesoscopic twin-beam states for novel Quantum Communication protocols. International Journal of Quantum Information, p.2340004.Google Scholar
- Choudhury, B.S., Mandal, M.K., Samanta, S. and Dolai, B., 2023. A bidirectional hybrid quantum communication scheme for a known and an unknown qubit. Quantum Studies: Mathematics and Foundations, 10(1), pp.89-99.Google ScholarCross Ref
- Zhou, L., Lin, J., Xie, Y.M., Lu, Y.S., Jing, Y., Yin, H.L. and Yuan, Z., 2023. Experimental quantum communication overcomes the rate-loss limit without global phase tracking. Physical Review Letters, 130(25), p.250801.Google ScholarCross Ref
- Caleffi, M., Simonov, K. and Cacciapuoti, A.S., 2023. Beyond Shannon Limits: Quantum Communications through Quantum Paths. IEEE Journal on Selected Areas in Communications.Google ScholarDigital Library
- Mitra, A., Badhani, H. and Ghosh, S., 2023. Improvement in quantum communication using quantum switch. Physica Scripta, 98(4), p.045101.Google ScholarCross Ref
- Klein, J.W. and Bastian, B., 2023. The fusion-secure base hypothesis. Personality and Social Psychology Review, 27(2), pp.107-127.Google ScholarCross Ref
- Li, C., Jiang, B., Guo, Y. and Xin, X., 2023. Efficient Group Blind Signature for Medical Data Anonymous Authentication in Blockchain-Enabled IoMT. Computers, Materials & Continua, 76(1).Google Scholar
- Do, K., Hanzlik, L. and Paracucchi, E., 2023. M&M'S: Mix and Match Attacks on Schnorr-type Blind Signatures with Repetition. Cryptology ePrint Archive.Google Scholar
- Deng, Z.M., Lu, D.J., Chen, T., Mou, H.J. and Wei, X.J., 2023. Quantum (t, m, n) Threshold Group Blind Signature Scheme with Flexible Number of Participants. International Journal of Theoretical Physics, 62(9), p.201.Google ScholarCross Ref
- Klein, J.W. and Bastian, B., 2023. The fusion-secure base hypothesis. Personality and Social Psychology Review, 27(2), pp.107-127.Google ScholarCross Ref
- Pereira, M., Currás-Lorenzo, G., Navarrete, Á., Mizutani, A., Kato, G., Curty, M. and Tamaki, K., 2023. Modified BB84 quantum key distribution protocol robust to source imperfections. Physical Review Research, 5(2), p.023065.Google ScholarCross Ref
- Kong, P.Y., 2023. Challenges of Routing in Quantum Key Distribution Networks with Trusted Nodes for Key Relaying. IEEE Communications Magazine.Google Scholar
- Wei, J.I.A., Qiangqiang, Z.H.A.N.G., Yuxiang, B.I.A.N. and Wei, L.I., 2023. Research on the upper bound of collective attack in E91-QKD. Chinese Journal of Quantum Electronics, 40(3), p.407.Google Scholar
- Zhao, W., Wang, F.Q., Mao, Y.Y., Zhong, H., Ding, C. and Ruan, X.C., 2023. Teleportation-based continuous-variable quantum digital signature. Results in Physics, p.107018.Google Scholar
- Zhang, Z., You, C., Magaña-Loaiza, O.S., Fickler, R., León-Montiel, R.D.J., Torres, J.P., Humble, T., Liu, S., Xia, Y. and Zhuang, Q., 2023. Entanglement-Based Quantum Information Technology. arXiv preprint arXiv:2308.01416.Google Scholar
- Deng, Z.M., Lu, D.J., Chen, T., Mou, H.J. and Wei, X.J., 2023. Quantum (t, m, n) Threshold Group Blind Signature Scheme with Flexible Number of Participants. International Journal of Theoretical Physics, 62(9), p.201.Google ScholarCross Ref
Recommendations
Arbitrated quantum signature scheme with quantum walk-based teleportation
Quantum walks can be applied for some quantum information processing tasks such as quantum search, element distinctness, state transfer and teleportation. In this paper, we present an arbitrated quantum signature scheme with quantum walk-based ...
Cyclic quantum teleportation
We propose a scheme of cyclic quantum teleportation for three unknown qubits using six-qubit maximally entangled state as the quantum channel. Suppose there are three observers Alice, Bob and Charlie, each of them has been given a quantum system such as ...
Construction of general quantum channel for quantum teleportation
We investigate teleportation and controlled teleportation of an arbitrary $$N$$ -qubit state by using a multipartite entanglement channel. By establishing one-to-one correspondence between an $$N$$ -qubit quantum state and a high-dimension quantum state, we ...
Comments