Papers
Topics
Authors
Recent
Search
2000 character limit reached

An Experimentally Validated Feasible Quantum Protocol for Identity-Based Signature with Application to Secure Email Communication

Published 27 Mar 2024 in cs.CR, cs.IT, and math.IT | (2403.18247v1)

Abstract: Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In 1984, Shamir developed the first Identity-based signature (IBS) to simplify public key infrastructure and circumvent the need for certificates. It makes the process uncomplicated by enabling users to verify digital signatures using only the identifiers of signers, such as email, phone number, etc. Nearly all existing IBS protocols rely on several theoretical assumption-based hard problems. Unfortunately, these hard problems are unsafe and pose a hazard in the quantum realm. Thus, designing IBS algorithms that can withstand quantum attacks and ensure long-term security is an important direction for future research. Quantum cryptography (QC) is one such approach. In this paper, we propose an IBS based on QC. Our scheme's security is based on the laws of quantum mechanics. It thereby achieves long-term security and provides resistance against quantum attacks. We verify the proposed design's correctness and feasibility by simulating it in a prototype quantum device and the IBM Qiskit quantum simulator. The implementation code in qiskit with Jupyternotebook is provided in the Annexure. Moreover, we discuss the application of our design in secure email communication.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (28)
  1. Practical quantum digital signature with a gigahertz bb84 quantum key distribution system. Optics letters, 44(1):139–142, 2019.
  2. Optimal encryption of quantum bits. Physical review A, 67(4):042317, 2003.
  3. Public-key quantum digital signature scheme with one-time pad private-key. Quantum Information Processing, 17(1):10, 2018.
  4. Efficient identity-based signature scheme with message recovery. In Journal of Physics: Conference Series, volume 1344, page 012016. IOP Publishing, 2019.
  5. Forward secure identity-based signature scheme with rsa. In IFIP International Conference on ICT Systems Security and Privacy Protection, pages 314–327. Springer, 2019.
  6. Koblitz, Neal. Elliptic curve cryptosystems. Mathematics of computation, 48(177):203–209, 1987.
  7. Kravitz, David W. Digital signature algorithm, July 27 1993. US Patent 5,231,668.
  8. Identity-based signature scheme secure in ephemeral setup and leakage scenarios. In International Conference on Information Security Practice and Experience, pages 310–324. Springer, 2019.
  9. Identity-based signature with server-aided verification scheme for 5g mobile systems. IEEE Access, 8:51810–51820, 2020.
  10. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
  11. A provable secure key-escrow-free identity-based signature scheme without using secure channel at the phase of private key issuance. Sādhanā, 44(6):1–9, 2019.
  12. Shamir, Adi. Identity-based cryptosystems and signature schemes. In Workshop on the theory and application of cryptographic techniques, pages 47–53. Springer, 1984.
  13. Privacy-preserving quantum protocol for finding the maximum value. EPJ Quantum Technology, 9(1):1–14, 2022.
  14. Shor, Peter W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM review, 41(2):303–332, 1999.
  15. Efficient identity-based signature authentication scheme for smart home system. In International Conference on Artificial Intelligence and Security, pages 639–648. Springer, 2020.
  16. A lightweight identity-based signature scheme for mitigation of content poisoning attack in named data networking with internet of things. IEEE Access, 8:98910–98928, 2020.
  17. Efficient pairing-free provably secure scalable revocable identity-based signature scheme. Journal of Internet Technology, 21(2):503–509, 2020.
  18. Forward-secure identity-based signature with efficient revocation. International Journal of Computer Mathematics, 94(7):1390–1411, 2017.
  19. Leakage-resilient revocable identity-based signature with cloud revocation authority. Informatica, 31(3):597–620, 2020.
  20. Quantum authentication of classical messages without entangled state as authentication key. International Journal of Multimedia and Ubiquitous Engineering, 10(8):199–206, 2015.
  21. Identity-based quantum signature scheme with strong security. Optical and Quantum Electronics, 51(12):1–13, 2019.
  22. Identity-based quantum signature based on bell states. Optik, 200:163388, 2020a.
  23. Efficient identity-based public-key quantum signature scheme. International Journal of Modern Physics B, 34(10):2050087, 2020b.
  24. Practical quantum digital signature. Physical Review A, 93(3):032316, 2016.
  25. Practical quantum digital signature with configurable decoy states. Quantum Information Processing, 19(5):1–7, 2020.
  26. High-efficiency quantum digital signature scheme for signing long messages. Quantum Information Processing, 18(1):1–9, 2019.
  27. Communication-efficient revocable identity-based signature from multilinear maps. Journal of Ambient Intelligence and Humanized Computing, 10(1):187–198, 2019.
  28. , Kitak won ; Jino Heo ; Chun Seok Yoon ; Ji-Woong Choi and Hyung-Jin Yang. Quantum Signature Scheme for Participant Attack. Journal of the Korean Physical Society : 75, 271–276, 2019, Springer.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.