Abstract
In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy particles, applying the functional values of symmetric bivariate polynomial. As such, eavesdropping detection and identity authentication can both be executed. The security analysis shows that our scheme can neither be disavowed by the signatory nor denied by the verifier, and it cannot be forged by any malicious attacker.
  1. Introduction
Since Bennett and Brassard [] proposed the quantum key distribution (QKD) protocol in 1984, quantum cryptography has attracted extensive attention. Its security is guaranteed by the principles of quantum mechanics such as the Heisenberg uncertainty principle and the quantum no-cloning theorem. Quantum cryptography can provide the advantage of unconditional security, making the research of quantum cryptography increasingly important. Many important quantum cryptography branches have been developed, such as quantum key distribution [,], quantum signature (QS) [,,], quantum teleportation (QT) [], quantum authentication [], and deterministic secure quantum communication [].
Quantum signatures can be applied to verify the identity of the sender and the integrity of the information. The arbitrated quantum signature (AQS), providing many merits, has attracted much attention. In 2002, Zeng et al. [] proposed the first arbitrated quantum signature scheme using the Green–Horne–Zeilinger (GHZ) state and the quantum one-time pad (QOTP). Based on the design of the classical arbitrated digital signature, the scheme provides a re-verification service for signatory and receiver using the online signature provided by a trusted third party arbitrator. In 2008, Curty and Lutkenhaus [] investigated the scheme [], and they claimed that it was not clearly described and that the safety analysis was incorrect. In response to the controversy of Curty et al., Zeng et al. [] proved the scheme [] in more detail. In 2009, to reduce the complexity and improve the efficiency of the protocol [], Li et al. [] proposed an AQS scheme based on the Bell states rather than the GHZ states and proved its advantages in terms of transmission efficiency and low complexity. Unfortunately, in 2010, Zou and Qiu [] argued that Li’s AQS scheme can be disavowed by the receiver, and they proposed an AQS protocol that uses bulletin boards and other security schemes that do not use entangled state. Their scheme further simplified the protocol of Li et al., and an improved AQS scheme was designed using single particles that can resist the denunciation of the receiver, thus reducing the difficulty of the physical implementation of AQS. However, in 2011, Gao et al. [] conducted the first comprehensive cryptanalysis of previous AQS schemes in terms of forgery and disavowal. They found that the existing AQS schemes based on QOTP encryption [,] all have some security problems. In other words, the receiver Bob can realize the existence of the forgery of a signature under the known message attack, while the sender Alice can successfully disavow any signature of hers through a simple attack. Choi et al. [] found that most AQS protocols can be cracked through a specific existential forgery attack due to the careless taking advantage of the optimal quantum one-time pad based on Pauli operators. To overcome this weakness, they proposed a simple method to ensure the security of the signature. As Choi et al.proved, Bob could not simultaneously forge both the information and the signature to be verified by an arbitrator in the event of a dispute. In the same year, Yang et al. [] demonstrated how to construct an arbitrated quantum signature protocol for classical messages using untrusted arbitrators. In order to solve the security problems experienced with the AQS protocol, Zhang et al. [] analyzed the existing security problems [,] in 2013 and suggested some corresponding improvement strategies to counter forgery attacks. In order to solve the problem proposed by Gao et al. [], Liu et al. [] designed a new QOTP algorithm in 2014, which mainly relies on inserting decoy states into fixed positions, and constructed an unconditionally secure AQS scheme with fast signing and verifying using only a single particle state. In 2015, Li [] used chained CNOT operation for encryption, instead of quantum one-time pad, to ensure the security of the protocol. To improve the efficiency of quantum bit to 100%, Yang [] proposed an AQS scheme with the cluster state in 2016. In 2017, in order to resist forgery attacks and disavowal attacks, Zhang et al. [] proposed a new quantum encryption based on the key-controlled chained CNOT operations (KCCC encryption), and through KCCC encryption, constructed an improved arbitrated quantum signature protocol. In 2016, Yang et al. [] also proposed a theoretically extensible quantum digital signature with a star-like cluster state. In 2018, Shi et al. [] proposed an arbitrated quantum signature scheme with the Hamiltonian algorithm based on blind quantum computation. Due to the application of blind quantum computation, it is not necessary to recover the original message during verification, which can improve the simplicity and operability of AQS. In the same year, Feng et al. [] constructed an AQS scheme based on continuous variable squeezed vacuum states rather than coherent states to further improve coding efficiency and performance. In 2019, Feng et al. [] proposed an AQS scheme with quantum walk-based teleportation, which does not require the preparation of entangled particles in advance, making the AQS protocol more flexible and practical. In 2020, Chen et al. [] proposed an offline arbitrated semi-quantum signature scheme based on four-particle cluster states, in which the classical parties can sign with the assistance of a quantum arbitrator. Different from the typical arbitrated quantum signature schemes, the arbitrator in this protocol acts as a relay station of signature transmission and no longer interferes with the direct authentication of the signature, so that the signature receiver has completed authentication rights. There is no additional direct communication between the signatory and the receiver, which reduces the complexity of transmission. However, the above AQS scheme does not consider authentication between signatory, arbitrator, and verifier.
Quantum teleportation is a technology that uses the entangled state or cluster state to transmit information between two sides of communication. The first scheme of quantum teleportation was proposed by Bennett et al. [] in 1993. It is a scheme of teleportation through classical channel and an EPR entangled channel. In 1998, Karlsson and Bourennane [] proposed controlled quantum teleportation. Its basic idea is that the receiver reconstructs the unknown quantum state with the help of the controller. Until now, quantum teleportation has been studied using the GHZ states [], W. states [,], cluster states [], and other entangled states as quantum channels. In recent years, many quantum signature schemes have used entangled states as quantum channels, and methods were proposed to transmit unknown quantum states of a single particle [] or double particles []. In 2005, Brown et al. [] developed a computationally feasible entanglement measurement method based on negative bias transposition criterion, and found highly entangled four-qubit states and five-qubit states by searching. In 2008, Muralidharan and Panigrahi [] investigated the usefulness of the five-qubit state introduced by Brown et al. [] for quantum information applications such as quantum teleportation. The results show that this state can be used for perfect teleportation of arbitrary single- and two-qubit systems.
In this paper, we construct an arbitrated quantum signature scheme that can verify the identity of participants using five-qubit entangled states as quantum channels and controlled quantum teleportation. The security analysis result shows that our AQS scheme ensures that the signatory Alice cannot disavow, the verifier Bob cannot repudiate, and any illegal attacker can not forge. The proposed scheme uses mutually unbiased bases particles as decoy particles. It applies a pair of function values of symmetric binary polynomials to perform a unitary operation on decoy particles so that eavesdropping detection and identity verification between participants can be performed. In addition, the scheme only needs von Neumann measurement, Bell measurement, and a unitary operation to recover the single-particle qubit state. It replicates message from the signatory Alice to the verifier Bob, which is an attractive advantage for realizing an actual quantum communication network.
The scheme has the following advantages:
- (1)
 - The mutually unbiased bases particles are used as decoy particles to prevent external adversaries from eavesdropping during transmission;
 - (2)
 - The receiver only needs to ask about the position of the decoy particles without asking what the measurement bases are in the process of eavesdropping detection;
 - (3)
 - The scheme provides the function of identity authentication among participants. It uses a pair of function values of symmetric binary polynomials as parameters of the unitary operation, which is used to act on the decoy particles to verify the identity of participants.
 
The rest of this article are organized as follows. In Section 2, the concepts of the arbitrated quantum signature, mutually unbiased bases and controlled quantum teleportation are introduced. In Section 3, the detailed process of the proposed protocol is described. In Section 4 and Section 5, the verifiability analysis and safety analysis are conducted, respectively. Finally, a brief conclusion is provided in Section 6.
2. Preliminaries
In this section, we first briefly review some notions concerning the arbitrated quantum signature scheme and the definition of mutually unbiased bases, which is presented in []. Then, we introduce controlled quantum teleportation, which is used in constructing the arbitrated quantum signature scheme. Finally, an example of controlled quantum teleportation is given.
2.1. Some Notions concerning the Arbitrated Quantum Signature
A digital signature scheme is a cryptographic primitive that provides the receiver of a message with assurance about the integrity of the data, and the identity of the sender/signatory. Furthermore, it offers unforgeable and undeniable property. Similarly, the arbitrated signature scheme is a digital signature scheme finished with the help of an arbitrator, who is a disinterested third party trusted to complete a protocol. Here “trusted” means that all people involved in the protocol accept what he says as true and what he does as correct, as well as that he will complete his part of the protocol []. The quantum signature is a quantum version of the classical digital signature.
2.2. Mutually Unbiased Bases
Definition 1 
([]). We suppose that  and  are two sets of standard orthogonal bases, which are defined over a q-dimensional complex space . We state that  and  are mutually unbiased if the following relationship is satisfied: .
If any two sets of standard orthogonal bases  in space  is unbiased, then this set is called an unbiased bases set. Additionally, one can find at most  mutually unbiased bases if q is an odd prime number. In particular, the computation basis is expressed as , where . In addition to the computation basis, the remaining q groups of unbiased bases can be expressed as , where  and  represent the number of the mutually unbiased bases and  list the number of vectors for the given bases. For  these mutually unbiased bases satisfy the following conditions: .
Letting , we have following operations:
      
        
      
      
      
      
    
For the convenience of expression,  is denoted as  which is a unitary operator, that is, . Especially, we have .
2.3. Controlled Quantum Teleportation
Our arbitrated quantum signature scheme is based on controlled quantum teleportation. The five-qubit entangled state can be used to perfect the teleportation of arbitrary single- and two-qubit systems [], which are suitable for maximum contact teleportation and satisfy the biggest task-oriented definition of entangled state []. Due to the above advantages, in this section, we use the five-qubit entangled state as the quantum channel to execute controlled quantum teleportation. The design form is as follows:
      
        
      
      
      
      
    
		In the form above,  represent the four Bell states of two particles, respectively,  and . These states exhibit true multipartite entanglement from both negative bias measurements and von Neumann measurements. Even after tracking one or two qubits from this state, entanglement is maintained in the resulting subsystem, which is therefore highly robust.
In the quantum teleportation process, the participants are Alice, Trent, and Bob. Alice owns particles (M, 2, 3), Trent owns particles (1, 4), and Bob owns the particle (5).
The model of controlled quantum teleportation is shown in Figure 1.
      
    
    Figure 1.
      The model of controlled quantum teleportation.
  
The working process of the controlled quantum teleportation is described below:
Step 1: Alice performs three-particle von Neumann measurements of the particles (M, 2, 3) in her possession. The three-particle von Neumann measurement basis is , as shown in Table 1.
       
    
    Table 1.
    The three-particle von Neumann measurement basis.
  
Suppose Alice carries the information of the quantum state of particle M as , where the coefficients  and  are unknown and satisfy . The combined state of the entire system  consisting of particles M and  is given by the formula below.
        
      
        
      
      
      
      
    
Step 2: Alice conveys her measurement outcomes to Bob through the classical channel. If Alice uses measurement basis  to measure , then  will collapse into the corresponding states shown in Table 2.
       
    
    Table 2.
    The outcomes of Alice’s measuring  with measurement basis .
  
Step 3: Trent uses Bell measurement basis  to perform two-particle measurements on particles (1,4). After Trent measures  with Bell measurement basis ,  collapses to the corresponding state shown in Table 3.
       
    
    Table 3.
    Outcomes of Trent’s measuring  with Bell measurement basis.
  
Step 4: Trent sends his measurement results to Bob through the classical channel.
Step 5: Following Trent and Alice’s measurements, Bob performs an appropriate unitary operation  and successfully reconstructs the original unknown quantum state  on the particle (5).
The participants’ measurement outcomes and the unitary operation  are shown in Table 4, in which MO represents the measurement outcomes and all the Pauli matrices are shown below.
        
      
        
      
      
      
      
    
       
    
    Table 4.
    The relationship between Alice’s, Trent’s measurement outcomes, and Bob’s unitary operation.
  
Based on Alice and Trent’s measurement outcomes, Bod performs the corresponding unitary operation  on particle (5) and his result is . This is the original information particle state. That is, Alice successfully transmits the unknown quantum state to Bob under Trent’s control.
Example 1. 
Suppose that the information particle states are , , ,. Alice combines each information particle state and five-particle entangled state into a six-particle state sequence: , , , , , . Alice performs von Neumann measurement of the particles (M,2,3) in the sequence. Suppose that von Neumann measurement outcomes are , , , and Trent’s measurement outcomes of the particles (1,4) in the sequence are , , , , , , , , , . At this time, the states of all particles (5) should be , , , , , , , , , . After Bob performs the following unitary operation:  , the states of the information particles are .
3. The Proposed Verifiable Arbitrated Quantum Signature Scheme
In our scheme, Alice the signatory, Bob the verifier, and Trent the arbitrator are defined as the three participants. The arbitrator Trent should be trusted by both Alice and Bob. The detailed procedures of our scheme can be described as follows.
3.1. Initializing Phase
Step I1: Alice and Trent share secret key  and Bob and Trent share secret key . The secret key distribution task can be performed using the QKD protocol, which has been proven to provide unconditional security [,].
Step I2: Trent selects a -order symmetric binary polynomial:  mod q, where q is a prime number, , , , ,  is a finite field. Suppose that the public identity information for the participants Alice, Bob, and Trent is . Trent computes two share polynomials  and . The share polynomial  is encrypted as  and  is sent to Alice. The share polynomial  is encrypted as  and  is sent to Bob.
Step I3: Alice receives  and decrypts it with secret key  to obtain . Alice calculates  and  based on Bob’s and Trent’s public identity information  and . Similarly, Bob can calculate  and  based on Alice’s and Trent’s public identity information  and . Due to the symmetry of the binary polynomial, , , .
Step I4: According to the value of  and , Alice executes the unitary operations  and  on  to produce enough decoy particles:  and .
The parameter formation process of the initializing phase is shown in Figure 2.
      
    
    Figure 2.
      Initializing phase schematic diagram.
  
3.2. Signing Phase
Step S1: Alice obtains a qubit string  based on the signature information m. Suppose there are n qubits in the information qubit string , ⋯, , where the symbol  represents the collection and  represents a single qubit in . Any qubit  in  can be represented as a superposition of two eigenstates  and , namely, , where  are complex numbers that satisfy . Thus, the signed quantum information string of Alice can be represented as . Note that if the signature quantum state is known, any copies of  can be prepared in advance. If the signature quantum state is unknown, at least three copies of  are necessary, among which one is combined with 5-particle entangled state, one produces a secret qubit string , and the other is sent to Bob.
Step S2: Alice transforms the information qubit string  into a secret qubit string  in terms of the secret key . This transform method can be seen in [].
Step S3: Alice prepares 5-particle entangled states. Alice combines each information qubit with 5-particle entangled state into the same long 6-particle qubit string. Each combinatorial state includes one information particle and five entangled particle. This 6-particle combination state can be described as follows:
      
        
      
      
      
      
    
Step S4: Alice uses  to represent the sequence of n (M, 2, 3) particles, where M represents the information particle to be signed.  represents the sequence of n (1, 4) particles, and  represents the sequence of n (5) particles. The decoy particles  and  are randomly inserted in  and  to form  and , respectively. Alice sends  to Trent and  to Bob.
Step S5: Alice performs von Neumann measurement on the particle sequence  that she has mastered. Suppose the n-group von Neumann measurement results are , where . Alice encrypts  and  to form the signature  by using quantum one-time pad algorithm []. Note that , even if sometimes described as classical bits, can be converted to qubits from the measurement basis . Alice sends the signature  and 2 information qubit strings  to Bob.
3.3. Verification Phase
Step V1: After confirming that Bob received , Alice tells Bob the position of the decoy particles and Bob executes the unitary operation  on the decoy particle , that is, . Then, Bob measures the decoy particles using measurement basis  . If , it implies that the identity authentication between Alice and Bob cannot be passed or the decoy particle have been eavesdropped. Finally, Bob calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step. Otherwise, the execution of the protocol is aborted. After Bob passes the eavesdropping detection and identity authentication of , the decoy particles are removed and  is restored. Similarly, after confirming that Trent received , Alice tells Trent the position of the decoy particles and then Trent executes the unitary operations  on the decoy particle , that is, . Then Trent measures the decoy particles using the measurement basis . If , it indicates that the identity authentication between Alice and Trent cannot be passed or that the particles are eavesdropped. Finally, Trent calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step; otherwise, they abandon the agreement. After Trent performs the eavesdropping detection and identity authentication on , the decoy particles are removed and  is restored.
Step V2: After Bob receives  which was sent by Alice, he encrypts  and  with the secret key  to obtain . Bob sends  to Trent via a quantum channel.
Step V3: After receiving , Trent decrypts it using secret key  to obtain  and , and decrypts  using secret key  to obtain  and . In the meantime, Trent measures  with measurement basis  to obtain the measurement outcome . Trent uses the secret key  to transform the information qubit string  into  and compare  with . If , Trent sets the initial check parameter ; otherwise, he sets . Note that this step and the subsequent comparison of the quantum states can be found in [,]. To ensure the integrity of the signature, Trent selects an appropriate hash function  and calculates .
Step V4: Trent encryptions , , , ,  with secret key  and sends ,  to Bob.
Step V5: Bob decrypts  to obtain , , ,  and . If , Bob can assume that the signature was forged, he rejects the signature and exits the verification process; otherwise, Bob continues with the next verification process.
Step V6: According to the values of  and , Bob chooses the corresponding unitary operator  in Table 4. Bob performs unitary operation  on the particles in sequence  and measures them to obtain the quantum state . Notice that  is the result of executing controlled quantum teleportation. Then, he compares whether it is equal to . If , Bob considers the signature invalid and rejects it. If , Bob calculates  with the same hash function and compares  with . If , Bob accepts  as the signature of  from Alice; otherwise, the signature is rejected.
The schematic diagram of the main steps of the arbitrated quantum signature scheme is shown in Figure 3.
      
    
    Figure 3.
      Schematic diagram of the main steps of the arbitrated quantum signature scheme.
  
4. Verifiability Analysis
We can prove that, in this scheme, identity authentication and eavesdropping detection can be conducted between Alice and Bob as well as between Alice and Trent according to the measurement outcomes of the decoy particles. An example for the proposed verifiable arbitrated quantum signature scheme can be seen in Appendix A.
In steps I3 and I4, according to Alice’s share polynomial  and Bob’s publicly identified information , Alice calculates  and creates decoy particles  According to Bob’s share polynomial  and Alice’s publicly identified information , Bob calculates . In step V1, after Bob receives , he performs the unitary operation  on , that is . According to the properties of symmetric binary polynomials, we have  and . Without external eavesdropping and cheating on either side, Bob’s measurement outcomes of the decoy particles should be ; otherwise, it can be determined that either identity cheating on both sides or external eavesdropping are occurring. Therefore, Alice and Bob can verify whether identity cheating is occurring according to the measurement outcomes of the decoy particles. Similarly, identity verification and eavesdropping detection can also be conducted between Alice and Trent according to the measurement outcomes of the decoy particles.
5. Safety Analysis
A secure quantum signature scheme should be of an unforgeable and undeniable property. In other words, it should meet the following requirements: (1) The signature cannot be forged by an attacker (including external adversary Eve and malicious receiver Bob). (2) The signatory Alice cannot disavow the message and signature she sent, and the receiver Bob cannot disavow that he received the signature. (3) That can be arbitrated if the receiver Bob admits the fact of receiving the signature but disavows the integrity of the signature.
5.1. Impossibility of Forgery
If the external attacker Eve tries to forge Alice’s signature  for her own benefit, she should know the key . However, due to the unconditional security of quantum key distribution [,], this is not possible. In addition, the quantum one-time pad protocol [] is used to improve the security. Therefore, Eve’s forgery is impossible.
If the malicious receiver Bob tries to forge Alice’s signature  for his own benefit, he must also know Alice’s secret key . However, for the same reason, he cannot obtain any information about the key . Thus, Bob cannot obtain the correct . Subsequently, the initial check parameter  used in the verifying phase will not be right, so the arbitrator Trent will discover this forgery. In a worse case, even if key  is exposed to Eve, she still cannot forge the signature because she cannot create the appropriate  and  to associate with the new message. Bob uses the correlation of the Bell state to find this kind of forged file; further verification of  cannot be established without the correct . However, if Bob knew the secret key , forgery would be inevitable.
We can prove that Eve, an external attacker, cannot entangle a decoy particle or an information particle with an auxiliary particle to steal secret information and forge a signature. See Appendix B for details.
5.2. Impossibility of Disavowal by the Signatory and the Verifier
A secure quantum signature scheme should have undeniable property. In other words, once the quantum signature is verified as a valid signature, the signatory cannot disavow the fact that the quantum signature is generated by them. The receiver of the signature cannot disavow the fact that he has received the quantum signature.
5.2.1. Impossibility of Disavowal by the Signatory Alice
Suppose Alice tries to disavow the signature  that she has signed. As shown in Figure 4, after receiving the signature , Bob cannot decrypt it without the key . He can only encrypt  and  to obtain  and sends  to Trent. After receiving , the arbitrator Trent decrypts  and  with  and . As the signature  contains the key  shared only by Alice and Trent, Trent can accurately confirm that the signature  was signed by Alice. Whether  is the signature of the message  is determined by the initial check parameter  calculated by the arbitrator Trent. Because , , if , namely , then the signature  was signed by Alice for the message .
      
    
    Figure 4.
      Diagram of transferring signature information.
  
5.2.2. Impossibility of Disavowal by the Verifier Bob
Similarly, as long as Trent receives the  sent from Bob, because  contains the key  shared only by Bob and Trent, Trent can confirm that Bob received the signature and cannot change it, that is, Bob cannot disavow the fact that he received the signature. If Alice changes signature  to , her behavior will be found when Bob calculates hash value  and compares it with . If Bob admits to receiving the signature, but disavows the integrity of the signature, it can be arbitrated according to the hash value  of .
In this scheme, the eavesdropping detection also functions as identity authentication, which can strengthen the undeniable property of Alice and Bob. In conclusion, our verifiable arbitrated quantum signature scheme has undeniable security.
6. Conclusions
In this paper, we proposed a verifiable arbitrated quantum signature scheme based on five-qubit entangled state. The proposed scheme uses mutually unbiased bases particles as decoy particles, and performs unitary operations on these decoy particles using the function values of symmetric binary polynomials, which can carry out not only eavesdropping detection, but also identity authentication among participants.
Due to the unconditional security of quantum key distribution and the quantum one-time pad, the external attacker Eve cannot know Alice’s key ; she cannot forge Alice’s signature  for her own benefit. For the same reason, Bob cannot forge Alice’s signature , either. In order to avoid Alice’s disavowal, we set that when Trent receives Alice’s signature , the hash function value  of the signature is calculated to ensure the integrity of the signature. After Trent receives  and decrypts  and , the initial check parameter  confirms that  is jointly generated by  and , which proves that Alice did not cheat. At this time, since Trent had no information on parameter , he could not forge a new signature. After Bob receives  and decrypts it, as the information of  and  are in his grasp at this time, he can use the function of quantum teleportation to reconstruct the information qubit  to judge whether to accept the quantum signature  signed by Alice.
Different from the signature scheme in classical cryptography, the security of our scheme is guaranteed by the quantum one-time pad [] and quantum key distribution [,]. Therefore, it is unconditionally secure. The five-qubit entangled state plays a key role in quantum information processing tasks and it is the threshold number of qubits required for quantum error correction []. The principle of five-photon entanglement and open teleportation was reported in [] and proved that von Neumann measurement, Bell measurement, and single-particle measurement are all feasible under the current technical and experimental conditions, so the scheme has good application value. Compared with the existing arbitrated quantum signature scheme [,,,,], our scheme has high stability and can avoid being disavowed for the integrality of signature . But due to the large number of qubits used in the scheme, it also experiences the problem of low quantum efficiency.
Author Contributions
Data curation, Z.H.; Methodology, J.Y.; Project administration, Z.L.; Writing—original draft, D.L.; Writing—review & editing, D.L. All authors have read and agreed to the published version of the manuscript.
Funding
This research was funded by National Natural Science Foundation of China, grant number 11671244; 12071271 and The Applied Basic Research Project of Qinghai Province, grant number 2019-ZJ-7099.
Acknowledgments
We would like to thank the anonymous reviewers for their valuable comments. This work was supported by the National Natural Science Foundation of China under grant 11671244 and Grant 12071271. It was also financially supported by the Applied Basic Research Project of Qinghai Province (2019-ZJ-7099).
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. An Example for the Proposed Scheme
Suppose that Alice wants to sign the information particles  , The following procedure needs to be performed.
Appendix A.1. Initializing Phase
Step I1: Alice and Trent share secret key . Bob and Trent share secret key .
Step I2: Trent selects a 4-order symmetric binary polynomial . Suppose that Alice’s identity information is , Bob’s identity information is , and Trent’s identity information is . Trent calculates three share polynomials ,  and . Trent encrypts  and sends  to Alice, and encrypts  and sends  to Bob.
Step I3: After Alice and Bob receive  and , respectively, Alice decrypts  by using keys  to get  and Bob decrypts  by using keys  to get . Alice calculates  and  based on Bob’s and Trent’s public identity information  and . Similarly, Bob calculates  and  based on Alice’s and Trent’s public identity information  and .
Step I4: Alice executes the unitary operations  and  on  to produce enough decoy particles:  and .
Appendix A.2. Signing Phase
Step S1: Suppose that the information qubit string  obtained by Alice is , .
Step S2: Using secret key , Alice transforms the information qubit string  into .
Step S3: Alice prepares 5-particle entangled states:  ++ Alice combines each information qubit state with 5-particle entangled state into the same long 6-particle qubit string. The 6-particle qubit string is shown in Table A1.
       
    
    Table A1.
    The 6-particle qubit string composed of information states and 5-particle entangled states.
  
Table A1.
    The 6-particle qubit string composed of information states and 5-particle entangled states.
      Step S4: Alice inserts decoy particles  and  into sequence  and  to form  and , respectively. Alice sends  to Trent and  to Bob.
Step S5: Alice performs von Neumann measurement on the particles sequence  that she has mastered. Suppose that 10-group von Neumann measurement outcomes are . Alice encrypts  and  to form the signature:
      
        
      
      
      
      
    
		  Then, Alice sends the signature  and 2 information qubit strings  to Bob.
Appendix A.3. Verifytion Phase
Step V1: After confirming that Bob received , Alice tells Bob the position of the decoy particles, and then Bob executes the unitary operation  on the decoy particle . That is, . Bob uses measurement basis  to measure the decoy particles. If , it implies that the identity authentication between Alice and Bob cannot be passed or the particles have been eavesdropped. Finally, Bob calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step; otherwise, the execution of the protocol is aborted. After Bob passes the eavesdropping detection and identity authentication on , the decoy particles are removed and  is recovered. Similarly, after confirming that Trent received , Alice tells Trent the position of the decoy particles, and then Trent executes the unitary operation  on the decoy particle . That is, . Then Trent measures the decoy particles using the measurement basis . If , it implies that the identity authentication between Alice and Trent cannot be passed or that the particles are eavesdropped. Finally, Trent calculates the error rate based on measurement outcomes of the decoy particles. If the error rate is less than the previously given value, they perform the next step; otherwise, they abandon the agreement. After Trent performs the eavesdropping detection and identity authentication on , the decoy particles are removed and  is restored.
Step V2: After Bob receives the  which is sent by Alice, he encrypts  and  with secret key  to obtain , , where  +++, ,  . Bob sends  to Trent via a quantum channel.
Step V3: After receiving , Trent decrypts it using secret key  to obtain  and , and decrypts  using secret key  to obtain  and . Where , ++ +, , , . In the meantime, Trent measures  with measurement basis  to obtain the measurement outcome . We suppose that , , . Using the secret key , Trent transforms the information qubit string  into  and compares  with . If , Trent sets the initial check parameter , otherwise he sets .
Step V4: Trent encrypts , , , ,  with secret key  to obtain  , , , , , ,  and sends it to Bob.
Step V5: Bob decrypts  to obtain , , ,  and . If , Bob can assume that the signature was forged, he rejects the signature and exits the verification process. Otherwise, Bob continues to carry out the next verification process.
Step V6: According to the values of  and , Bob chooses the corresponding unitary operator , , , , , , , , , . Bob performs unitary operation  on the particles in sequence  and measures them to obtain the quantum state , and then he compares whether it is equal to . If , Bob considers the signature invalid and rejects it. If , Bob computes  and compares  with . If , Bob accepts  as the signature of  sent by Alice. Otherwise, the signature is rejected.
Appendix B. Unforgeable Property of Eve’S Entangle-Measure Attack
Appendix B.1. Eve Cannot Entangle a Decoy Particle to Forge a Signature
We can prove that the external attacker Eve cannot entangle a decoy particle with an auxiliary particle to steal secret information and forge a signature.
Lemma A1. 
For the measurement basis , , we have .
Proof.  
      
        
      
      
      
      
     □
Suppose that Eve prepares an auxiliary quantum state , and she executes unitary operation , which can entangle the auxiliary quantum states onto the transmitted particles to steal secret information by measuring the auxiliary particles. Consider the corresponding measurement basis , which is in the attack of decoy particles. According to Lemma 1, the following expression can be obtained by executing unitary operation .
          
      
        
      
      
      
      
    
      
        
      
      
      
      
    
          where  and  express the initial auxiliary quantum state;  denotes the only pure state obtained by executing unitary operation .
Therefore, their coefficients satisfy condition . The unitary operation  must satisfy the following conditions if there is no error introduced by Eve:
      
        
      
      
      
      
    .
Consequently,  and  can be simplified as: ,  .
Similarly, Eve can obtain the equations: , where , . For any , we can obtain q equations. According to these equations, the following formula can be calculated:
      
        
      
      
      
      
    
This means that, no matter what quantum states are adopted, Eve can only obtain the same information from the auxiliary particles. Therefore, Eve fails to obtain any signature messages by conducting this kind of attack.
Appendix B.2. Eve Cannot Entangle an Information Particle to Forge a Signature
We can also prove that Eve cannot entangle an information particle with an auxiliary particle to steal secret information and forge a signature. Since Eve does not have the keys  and , there is only one opportunity for him to attack Bob’s information particle, i.e., during the transmission of the particle (5) from Alice to Bob in Step V6 of the verification phase. We can describe the effect of Eve’s eavesdropping on qubit (5) using the following equations:
      
        
      
      
      
      
    
      
        
      
      
      
      
    
      
        
      
      
      
      
    
          where  is Eve’s auxiliary state.  are the pure auxiliary states determined uniquely by the unitary operation . Therefore,  must satisfy the relationship , i.e., , , , . If no errors are introduced in Bob’s detection, we can get . This implies that if Eve wants to attack without introducing any error, his auxiliary state and Alice’s particle (5) will be in a tensor product state. Therefore, if Eve tries to take an attack strategy on the particle (5), he will be detected during the comparison between  and  in Step V6 of the verification phase.
References
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 10–19 December 1984; pp. 175–179. [Google Scholar]
 - Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
 - Zhou, Y.H.; Yu, Z.W.; Li, A.; Hu, X.L.; Wang, X.B. Measurement-device-independent quantum key distribution via quantum blockade. Sci. Rep. 2018, 8, 4155. [Google Scholar] [CrossRef]
 - Ryan, A.; Erika, A. Unconditionally secure quantum signatures. Entropy 2015, 17, 5635–5659. [Google Scholar]
 - Chen, F.L.; Wang, Z.H.; Hu, Y.M. A new quantum blind signature scheme with bb84-state. Entropy 2019, 21, 336. [Google Scholar] [CrossRef] [Green Version]
 - Yadav, P.; Mateus, P.; Paunković, N.; Souto, A. Quantum contract signing with entangled pairs. Entropy 2017, 21, 821. [Google Scholar] [CrossRef] [Green Version]
 - Martini, F.; Sciarrino, F. Twenty years of quantum state teleportation at the sapienza university in rome. Entropy 2019, 21, 768. [Google Scholar] [CrossRef] [PubMed] [Green Version]
 - González-Guillén, C.; Vasco, M.; Johnson, F.; Pozo, N. An attack on zawadzki’s quantum authentication scheme. Entropy 2021, 23, 389. [Google Scholar] [CrossRef] [PubMed]
 - Jeong, Y.C.; Ji, S.W.; Hong, C.; Park, H.S.; Jang, J. Deterministic secure quantum communication on the bb84 system. Entropy 2020, 22, 1268. [Google Scholar] [CrossRef] [PubMed]
 - Zeng, G.H.; Keitel, C.H. Arbitrated quantum-signature scheme. Phys. Rev. A 2002, 65, 042312. [Google Scholar] [CrossRef] [Green Version]
 - Curty, M.; Lütkenhaus, N. Comment on Arbitrated quantum-signature scheme. Phys. Rev. A 2008, 77, 046301. [Google Scholar] [CrossRef] [Green Version]
 - Zeng, G. Reply to Comment on arbitrated quantum-signature scheme. Phys. Rev. A 2008, 78, 016301. [Google Scholar] [CrossRef]
 - Li, Q.; Chan, W.H.; Long, D.Y. Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 2009, 79, 054307. [Google Scholar] [CrossRef]
 - Zou, X.; Qiu, D. Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 2010, 82, 042325. [Google Scholar] [CrossRef]
 - Gao, F.; Qin, S.J.; Guo, F.Z.; Wen, Q.Y. Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 2011, 84, 022344. [Google Scholar] [CrossRef] [Green Version]
 - Choi, J.W.; Chang, K.Y.; Hong, D. Security problem on arbitrated quantum signature schemes. Phys. Rev. A 2011, 84, 062330. [Google Scholar] [CrossRef] [Green Version]
 - Yang, Y.G.; Zhou, Z.; Teng, Y.W.; Wen, Q.Y. Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 2011, 61, 773–778. [Google Scholar] [CrossRef]
 - Zhang, K.J.; Zhang, W.W.; Li, D. Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 2013, 12, 2655–2669. [Google Scholar] [CrossRef]
 - Liu, F.; Qin, S.J.; Su, Q. An arbitrated quantum signature scheme with fast signing and verifying. Quantum Inf. Process. 2014, 13, 491–502. [Google Scholar] [CrossRef]
 - Li, F.G.; Shi, J.H. An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 2015, 14, 2171–2181. [Google Scholar] [CrossRef]
 - Yang, Y.G.; Lei, H.; Liu, Z.C.; Zhou, Y.H.; Shi, W.M. Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 2016, 15, 2487–2497. [Google Scholar] [CrossRef]
 - Zhang, L.; Sun, H.W.; Zhang, K.J.; Jia, H.Y. An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 2017, 16, 70. [Google Scholar] [CrossRef]
 - Yang, Y.G.; Liu, Z.C.; Li, J.; Chen, X.B.; Zuo, H.J.; Zhou, Y.H.; Shi, W.M. Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 2017, 16, 12. [Google Scholar] [CrossRef]
 - Shi, R.H.; Ding, W.T.; Shi, J.J. Arbitrated quantum signature with Hamiltonian algorithm based on blind quantum computation. Int. J. Theor. Phys. 2018, 57, 1961–1973. [Google Scholar] [CrossRef]
 - Feng, Y.; Shi, R.; Guo, Y. Arbitrated quantum signature scheme with continuous-variable squeezed vacuum states. Chin. Phys. B 2018, 27, 020302. [Google Scholar] [CrossRef]
 - Feng, Y.; Shi, R.H.; Shi, J.J.; Zhou, J.; Guo, Y. Arbitrated quantum signature scheme with quantum walk-based teleportation. Quantum Inf. Process. 2019, 18, 254. [Google Scholar] [CrossRef]
 - Chen, L.Y.; Liao, Q.; Tan, R.C.; Gong, L.H.; Chen, H.Y. Offline arbitrated semi-quantum signature scheme with four-particle cluster state. Int. J. Theor. Phys. 2020, 59, 3685–3695. [Google Scholar] [CrossRef]
 - Bennett, C.H.; Brassard, G.; Crepeau, C.; Jozsa, R.; Peres, A.; William, K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993, 70, 1895–1899. [Google Scholar] [CrossRef] [PubMed] [Green Version]
 - Karlsson, A.; Bourennane, M. Quantum teleportation using three-particle entanglement. Phys. Rev. A 1998, 58, 99. [Google Scholar] [CrossRef]
 - Deng, F.G.; Li, C.Y.; Li, Y.S.; Zhou, H.Y.; Wang, Y. Symmetric multiparty-controlled teleportation of an arbitrary two particle entanglement. Phys. Rev. A 2005, 72, 656–665. [Google Scholar] [CrossRef] [Green Version]
 - Nie, Y.Y.; Liu, J.C.; Sang, M.H. Perfect teleportation of an arbitrary three-qubit state by using w-class states. Int. J. Theor. Phys. 2011, 50, 3225–3229. [Google Scholar] [CrossRef]
 - Agrawal, P.; Pati, A. Perfect teleportation and superdense coding with w-states. Phys. Rev. A 2006, 74, 154. [Google Scholar] [CrossRef] [Green Version]
 - Nie, Y.Y.; Li, Y.H.; Liu, J.C.; Sang, M.H. Quantum information splitting of an arbitrary three-qubit state by using two four-qubit cluster states. Quantum Inf. Process. 2011, 10, 297–305. [Google Scholar] [CrossRef]
 - Nie, Y.Y.; Hong, Z.H.; Huang, Y.B.; Yi, X.J.; Li, S.S. Non-maximally entangled controlled teleportation using four particles cluster states. Int. J. Theor. Phys. 2009, 48, 1485–1490. [Google Scholar] [CrossRef]
 - Zhang, B.; Liu, Y. Economic and deterministic quantum teleportation of arbitrary bipartite pure and mixed state with shared cluster entanglement. Int. J. Theor. Phys. 2009, 48, 2644–2651. [Google Scholar] [CrossRef]
 - Brown, I.D.K.; Stepney, S.; Sudbery, A.; Braunstein, S.L. Searching for highly entangled multi-qubit states. J. Phys. A Math. Gen. 2005, 38, 1119–1131. [Google Scholar] [CrossRef] [Green Version]
 - Muralidharan, S.; Panigrahi, P.K. Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit state. Phys. Rev. A 2006, 77, 032321. [Google Scholar] [CrossRef] [Green Version]
 - Wootters, W.K.; Fields, B.D. Optimal state-determination by mutually unbiased measurements. Ann. Phys. 1989, 191, 363–381. [Google Scholar] [CrossRef]
 - Lo, H.; Chau, H. Unconditional security of quantum key distribution over arbitrarily long distances. Science 1999, 283, 2050–2056. [Google Scholar] [CrossRef] [Green Version]
 - Shor, P.W.; Preskill, J. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 2000, 85, 441–444. [Google Scholar] [CrossRef] [Green Version]
 - Boykin, P.O.; Roychowdhury, V. Optimal encryption of quantum bits. Phys. Rev. A 2003, 67, 042317. [Google Scholar] [CrossRef] [Green Version]
 - Buhrman, H.; Cleve, R.; Watrous, J.; Wolf, R.D. Quantum fingerprinting. Phys. Rev. Lett. 2001, 87, 167902. [Google Scholar] [CrossRef] [PubMed] [Green Version]
 - Bennett, C.H.; DiVincenzo, D.P.; Smolin, J.A.; Wootters, W.K. Mixed-state entanglement and quantum error correction. Phys. Rev. A 1996, 54, 3824. [Google Scholar] [CrossRef] [PubMed] [Green Version]
 - Zhao, Z.; Chen, Y.A.; Zhang, A.N.; Yang, T.; Briegel, H.J.; Pan, J.W. Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature 2004, 430, 54–58. [Google Scholar] [CrossRef]
 
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.  | 
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).