Blind Delegation of Quantum Digital Signature: Difference between revisions
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
This [https://link.springer.com/article/10.1007/s11432-016-9061-4 example protocol] performs the task of Quantum Digital Signature such that the Signer does not get to know the content of the message being signed. | This [https://link.springer.com/article/10.1007/s11432-016-9061-4 example protocol] performs the task of Quantum Digital Signature such that the Signer does not get to know the content of the message being signed. | ||
It ensures that the owner cannot deny at a later stage having signed the message, a receiver cannot fake or alter the QDS and the verifier can use the above two properties to verify if the sent message is signed by the genuine sender, thus, satisfying properties of transferability, non-repudiation, and unforgeability. | It ensures that the owner cannot deny at a later stage having signed the message, a receiver cannot fake or alter the QDS and the verifier can use the above two properties to verify if the sent message is signed by the genuine sender, thus, satisfying properties of transferability, non-repudiation, and unforgeability. | ||
'''Tags:''' [[:Category:Multi Party Protocols|Multi Party (three)]], [[:Category:Quantum Enhanced Classical Functionality|Quantum Enhanced Classical Functionality]], [[:Category:Specific Task|Specific Task]], [[Quantum Digital Signature]] | |||
[[Category:Multi Party Protocols]] [[Category:Quantum Enhanced Classical Functionality]][[Category:Specific Task]] | |||
==Assumptions== | ==Assumptions== |
Revision as of 14:27, 16 May 2019
This example protocol performs the task of Quantum Digital Signature such that the Signer does not get to know the content of the message being signed. It ensures that the owner cannot deny at a later stage having signed the message, a receiver cannot fake or alter the QDS and the verifier can use the above two properties to verify if the sent message is signed by the genuine sender, thus, satisfying properties of transferability, non-repudiation, and unforgeability.
Tags: Multi Party (three), Quantum Enhanced Classical Functionality, Specific Task, Quantum Digital Signature
Assumptions
- Honest majority assumption: assumes that more than half the number of participating parties are honest. In the present case, at least two parties are honest.
- It requires authenticated classical channel and insecure quantum channels.
Outline
The Blind QDS Protocol consists of 5 stages: setup, key distribution, message blinding, signing and verification. Each pair of participants share a unique key using Simon et al.'s QKD Algorithm.
Setup
There are 3 participants. The owner is the one who will transform the message into a matrix form and blind it. The signer will sign it. The verifier is the one who checks if a signature matches a message.
Key Distribution
All three pairs establish their pairwise quantum key matrices using the QKD protocol.
Message Blinding
The owner of the message now converts the message into matrix format. Then (s)he blinds the message matrix using the key shared with the verifier by multiplying the matrices. Now, (s)he encrypts the blind message with the key shared with the signer by multiplying the matrices. Finally, (s)he sends the encrypted matrix and the determinant of the blinded matrix to the signer and only the determinant of the message matrix to the verifier.
Signing
The signer creates a signature for the blinded message which means that he does not know the message matrix. He decrypts the encrypted message with his shared key to obtain the blinded message and checks its authenticity by comparing its determinant value with the received value. He then creates the signature using the blinded message and the key shared with the verifier and sends it to the verifier.
Verification
The verifier decrypts the signature using his key shared with the signer. Next, he un-blinds the blinded message using the key shared with the owner. He verifies the message matrix by comparing its determinant value with the received value.
Notation
- : Set of quantum key matrices shared between Owner and Signer.
- : Set of quantum key matrices shared between Signer and Verifier.
- : Set of quantum key matrices shared between Owner and Verifier.
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle M} : Set of message matrices to be signed.
- Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle M'} : Set of Blinded message matrices.
- : Set of Blinded and Encrypted message matrices.
- : Set of Signature matrices.
- : Number of elements in every set.
Hardware Requirements
- Requires any QKD setup.
- Insecure quantum and authenticated classical channels.
Properties
- The protocol provides security against both the forgery and repudiation attacks.
- The protocol can sign long messages and is not restricted to binary ones.
- The protocol has the ability to detect errors due to the usage of Fibonacci, Lucas and Fibonacci-Lucas matrices.
- The protocol uses the setup of Simon et al.'s QKD algorithm to distribute quantum keys.
Pseudocode
Every pair of parties share different quantum key matrices Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_{AB}} , and respectively using Simon et al.’s QKD algorithm. The key matrices , and Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_{BC}} are either Fibonacci or Lucas or Fibonacci-Lucas matrices. The protocol consists of 5 stages:
- Setup
- The owner who transforms the message into an -square matrix and blinds the matrix.
- The signer who signs the blind message.
- The verifier who checks if a signature matches the message.
- Key Distribution
- Every pair uses Simon et al.'s QKD protocol to establish their pairwise key matrices Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle \{K_{AB}^1, K_{AB}^2,..., K_{AB}^\alpha\} = K_{AB}} between Owner and Signer; between Signer and Verifier; between Owner and Verifier.
- Message Blinding
- The Owner transforms the message into matrices where , .
- The Owner blinds the message matrix using Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_{AC}}
- The Owner now encrypts the message matrix using
- Finally, the Owner sends to the Signer, and to the Verifier.
- Signing
- The Signer decrypts with the key to obtain .
where denotes the inverse matrix of Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_{AB}^k} . - If the determinant of recovered by the Signer is not equal to the value of the determinant obtained from the Owner, the Signer aborts the protocol. Otherwise, he performs the next step.
- He signs the blind message using . The signature is
- He then sends the signature Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle S = \{S^1, S^2,..., S^\alpha\}} to the Verifier.
- The Signer decrypts with the key to obtain .
- Verification
- The Verifier decrypts the signature Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle S}
using to obtain the blind message .
- The Verifier then un-blinds the message using Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle K_{AC}^k}
to obtain the message Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle M}
.
Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle M_k = M'_k \times (K_{AC}^k)^{-1} } - He then checks if the determinant of Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle M}
obtained from the signature is the same as obtained from the Owner. If it holds, he verifies the following equations:
- The Verifier decrypts the signature Failed to parse (SVG (MathML can be enabled via browser plugin): Invalid response ("Math extension cannot connect to Restbase.") from server "https://wikimedia.org/api/rest_v1/":): {\displaystyle S}
using to obtain the blind message .