南華大學機構典藏系統:Item 987654321/28179
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 18278/19583 (93%)
Visitors : 1023363      Online Users : 391
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://nhuir.nhu.edu.tw/handle/987654321/28179


    Title: 基於非對稱量子密碼不用指定驗證者的量子簽章方案
    Other Titles: A Publicly Verifiable Quantum Signature Scheme based on Asymmetric Quantum Cryptography
    Authors: 周芳琪
    ZHOU, FANG-QI
    Contributors: 資訊管理學系
    周志賢
    CHOU, JUE-SAM
    Keywords: 不可否認的量子簽章方案;模擬攻擊;量子非對稱密碼;Trapdoor 單向函數;單量子位旋轉加密;可公開驗證簽章
    Undeniable quantum signature scheme;Impersonation attack;Quantum asymmetric cryptography;Trapdoor one-way function;Single-qubit rotations encryption;Publicly verifiable signature
    Date: 2019
    Issue Date: 2022-04-28 15:37:28 (UTC+8)
    Abstract:   在2018年,Shi等人表明,Kaushik等人的量子簽章方案存在缺陷。它遭受了偽造攻擊。他們進一步提出了改進措施,試圖避免這種攻擊。但是,經過檢驗,我們發現他們改進的量子簽章法是可以被否認的,因為驗證者可以冒充簽章者簽署一條訊息。此後,當發生爭議時,他可以辯稱簽章是來自簽章者,而不是他所簽的。為了克服這種缺點,在本文中,我們提出了更進一步的改進,使其成為一個真實可用的量子簽章,可以被公開的非特定驗證者所驗證,因此可以更實際應用於現實生活中。在密碼分析之後,我們確認我們改進的簽章法不僅可以抵禦偽造攻擊,而且是不可否認的。
      In 2018, Shi et al showed that Kaushik et al's quantum signature scheme is defective. It suffers from the forgery attack. They further proposed an improvement, trying to avoid the attack. However, after examining we found their improved quantum signatureis deniable, because the verifier can impersonate the signer to sign a message. After that, when a dispute occurs, he can argue that the signature was not signed by him. It was from the signer. To overcome the drawback, in this paper, we proposed an improvement to make it a practical signature to be publicly verified and can be applied in real life. After cryptanalysis, we confirm that our improvement not only can resist the forgery attack but also is undeniable.
    Appears in Collections:[Department of Information Management] Disserations and Theses

    Files in This Item:

    File Description SizeFormat
    107NHU00396028-002.pdf969KbAdobe PDF96View/Open
    index.html0KbHTML569View/Open


    All items in NHUIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback