Abstract
Recently, Su et al. (Opt Comm 283:4408-4410, 2010) proposed a quantum blind signature based on the two-state vector formalism. Their protocol is rather practical because the signer and the blind signature requester only have to perform measurement operations to complete the quantum blind signature. This study points out that a dishonest signer in their scheme can reveal the blind signature requester's secret key and message without being detected by using Trojan horse attacks or the fake photon attack. A modified scheme is then proposed to avoid these attacks.
Original language | English |
---|---|
Pages (from-to) | 109-117 |
Number of pages | 9 |
Journal | Quantum Information Processing |
Volume | 12 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2013 Jan |
All Science Journal Classification (ASJC) codes
- Electronic, Optical and Magnetic Materials
- Statistical and Nonlinear Physics
- Theoretical Computer Science
- Signal Processing
- Modelling and Simulation
- Electrical and Electronic Engineering