Abstract
Quantum contract signing has the advantage of unconditional security compared with classical one. However, the prior works focus on two clients’ case. In this paper, we give a multiparty quantum contract signing protocol, which allows multiparty clients to sign an electronic contract simultaneously. The analysis shows that it not only satisfies the requirements for optimism and fairness but also can be realized with current technology.
1 Introduction
Contract signing is considered as a basic procedure in commercial transactions [1]. Traditional contract signing protocols are constrained by time, place and cost. With the emergence of e-commerce and other online transactions, the traditional contract signing protocols have been unable to meet the demand for online transactions. Therefore, the concept of electronic contract signing protocol was proposed [2]. Since fairness is the primary principle that electronic contract signing protocols must require, more electronic contract signing protocols took fairness as the research focus [3–7].
However, there exists an important problem that one client may commit on contract but not get the other’s commitment in the initial electronic contract signing protocols. Moreover, because of the non-synchronization of the network [8], one client always has more advantages than other clients. This unfair situation will cause serious outcomes, especially in a stock market [9]. A possible solution is to introduce a trusted third party (TTP). Furthermore, Even and Pagnia [10, 11] pointed out that without the involvement of a TTP, both truly fair electronic contract signing and fair exchange are not feasible. Therefore, electronic contract signing protocol with TTP is particularly important. Nevertheless, the involvement of TTP may lead to cryptographic attacks and higher communication costs; in addition, TTP may become a key factor that restricts the efficiency of the protocol. Therefore, how to optimize TTP participation becomes an important issue. The participation of TTP is optimized from the initial online mode to the off-line mode with stronger practicability [12, 13]. The electronic contract signing protocol with off-line TTP is more advantageous for TTP is not involved in other stages when no dispute happens.
Many classic electronic contract signing protocols involving three or more clients have been reported due to its application in real scenarios [14–17], but most of them are based on mathematical difficult problems and therefore is computationally secure. With the fast development of computing technology, their security is seriously challenged. Quantum cryptography are unconditionally secure in theory [18–22]. This is also the case for quantum contract signing, and therefore it has attracted much attention from researchers and many quantum electronic contract signing protocols have been presented [23–27]. Nevertheless, the prior works mainly deal with the application scenarios that two clients sign an electronic contract, but the multiparty case are not covered except a simple discussion in [9].
In this paper, we firstly study the design for multiparty quantum contract signing and give a specific protocol, which inherits the advantages of the prior works such as its unconditional security in theory and high fairness and so on. Furthermore, this protocol does not need long-time quantum storage and therefore can be realized with current technology.
This rest of this paper is organized as follows. In Section 2, we introduce the general model of multiparty quantum contract signing, and then present a multiparty quantum contract signing protocol in Section 3. In Section 4, we analyse its correctness, security and efficiency. Finally, we draw a conclusion in Section 5.
2 The model
The model of quantum contract signing includes n clients and a off-line TTP, who communicate with each other via classical and quantum channels. The channels are required to be authenticated in the model. The model consists of three phases: initializing phase, exchanging phase and binding phase. Specifically, in the initializing phase, the keys used for clients’ commitment on an electronic contract are established with the help of TTP. Then the clients exchange their commitment on the contract using the way of bit by bit in the exchanging phase, and TTP does not participate in the phase. When there is a dispute among clients, the binding phase is activated and TTP makes a judgement on the valid of commitment according to the testimonies submitted by the clients.
2.1 The initializing phase
• Preparing and distributing quantum states. TTP prepares n sets of quantum states , and then sends them to n clients P1, P2, …, Pn, respectively.
• Providing state information. TTP provides each client Pj with of the classical description for k = 1, 2, …, j − 1, j + 1, …, n, corresponding to a set , denoted as .
• Measuring quantum states. Each client Pj measures the quantum states distributed by TTP and keeps the measurement outcome .
• Assigning identifier number. TTP assigns a unique identifier number I to all the data, which is used to link a specific contract C in the exchanging phase.
2.2 The exchanging phase
• Computing Hash value. All the clients compute the Hash value of the contract C, the identifier number I and some restriction.
• Exchanging information. All clients exchange their respective measurement results with each other in the way of 2 bits by 2 bits.
• Completing commitment. Each of clients gets the others’ commitments on the contract C.
2.3 The binding phase
When a dispute happens, the binding phase is activated.
• Submitting testimonies. TTP requires that all clients send their respective testimonies to him.
• Making judgement. TTP makes a judgement on the valid of commitment according to the testimonies submitted by the clients.
3 The protocol
Assume that n + 1 participants are P1, P2, …, Pn in the protocol, and they will sign an electronic contract as follows.
3.1 The initializing phase
This phase can be divided into four steps (please see
Figure 1).
(1) TTP prepares n sets of quantum states , , ⋯, , and each state is randomly chosen from the set {|0⟩, |1⟩, | + ⟩, | − ⟩} for i = 1, 2, …, N and j = 1, 2, …, n, where N = kn. Moreover, quantum states |0⟩, |1⟩, | + ⟩ and | − ⟩ are denoted as classical bits 00, 01, 10 and 11, respectively, and thus the corresponding classical description for the n sets of quantum states can be represented as , , …, , where for i = 1, 2, …, N and j = 1, 2, …, n, the notation ‖ denotes the concatenation between bits. Then he assigns a unique identifier number I to all data so that it can be linked to a specific contract C in the exchanging phase.
(2) TTP provides a set that includes indices randomly chosen from a set Γ for each client Pj (j = 1, 2, …, n), where Γ = {1, 2, …, N}.
(3) For each client Pj (j = 1, 2, …, n), TTP provides Pj with of the classical description for k = 1, 2, …, j − 1, j + 1, …, n corresponding to the set , denoted as . Then TTP sends the identifier number I and quantum states to Pj while keeping the remaining classical description for j = 1, 2, …, n.
(4) For each client Pj (j = 1, 2, …, n), when receiving the quantum sates , Pj immediately measures each with Z-basis or X-basis randomly for i = 1, 2, …, N, and then uses the classical bits 00, 01, 10 and 11 to represent the measurement outcome |0⟩, |1⟩, | + ⟩ and | − ⟩, respectively, denoted as . Finally, Pj keeps the measurement outcome , the identifier number I, the classical description and the indices .
FIGURE 1

Depiction of initializing phase. TTP prepares n sets of quantum states. Then TTP sends the identifier number I, and classical description of other clients’ states corresponding to the set to Pj. Pj measures each with Z-basis or X-basis randomly for i = 1, 2, …, N, and then keeps the measurement outcome .
3.2 The exchanging phase
Suppose that all the
nclients
P1,
P2, …,
Pnagree on a contract
C, the identifier number
Ithat they want to use, and the time duration restriction
t. Then they commit the contract
Cby the following exchange phase (please see
Figure 2). Without loss of generality, assume that
P1is the initiator.
(1) All the clients compute the Hash value
where
H(⋅): (0,1)* → (0,1)
2Nis a collision-free hash function, used to generate a digest.
(2) If P1 agrees to sign the contract C, he computes
otherwise, he computes
FIGURE 2

Depiction of exchanging phase. All clients simultaneously commit on the contract C through exchanging their classical information with the way of 2 bits by 2 bits.
Then he sends
to other
n− 1 clients.
(3) For each Pj (j = 2, 3, …, n), if he has not received in the time duration restriction t, he immediately contacts TTP to perform the binding phase. Otherwise, he checks whether the index 1 is in or not. If the index 1 is not in , Pj performs the similar actions as P1 does in Step (2), i.e., if he agrees to sign the contract C, he computes
otherwise, he computes
Then he sends
to other
n− 1 clients. If the index 1 is in
, he computes
and then checks whether
holds or not. If the first bit of
is the same as that of
but Eq.
7does not hold,
Pjalso immediately contacts TTP to perform the binding phase. In other cases,
Pjalso performs the similar actions as
P1does in Step (2). This step is sequentially executed until each client has received the others’ first 2 bits and confirmed their validity.
(4) P1 performs the similar actions as that he does in Step (2), i.e., if he agrees to sign the contract C, he computes
otherwise, he computes
Then he sends
to other
n− 1 clients. Other
n− 1 clients performs the similar actions as that they does in Step (3). This step is also sequentially executed until each client has received the others’ second 2 bits and confirmed their validity.
(5) The similar procedure is repeated until each client has received all the others’ bits and confirmed their validity.
3.3 The binding phase
Without loss of generality, suppose that dispute appears at the
mth round and TTP requires that all clients send their respective testimonies to him. After receiving all the clients’ testimonies, if all of them accept the validity of the contract
Cor reject it, then TTP confirms and keeps it in case of possible dispute in future. Otherwise, TTP just considers the testimonies submitted by the clients who want to bind the contract
C. Furthermore, as long as one of the testimonies passes his verification, TTP declares the contract
Cis valid. Specifically, after receiving all clients’ testimonies, TTP only checks the part submitted by
P1,
P2, …,
Pkwho want to bind the contract
C. The check process can be described as follows (please see
Figure 3).
(1) For the testimonies I, H(C, I, t) and submitted by P1, TTP computes
FIGURE 3

Depiction of binding phase. TTP checks the testimonies submitted by the clients who want to bind the contract C and then gives a verdict on the validity of all clients’ commitment according to the check outcome.
For each
, if the first bit of
is equal to the one of
, i.e.,
, TTP checks whether
, then he counts the number
neof
that satisfies this condition. After that, he computes the ratio
, where
ntis the total number of
that should satisfy
. By simply computing, it can be found
. Finally, he checks whether the in equation
holds or not, where
αis a parameter independently chosen by TTP according to some publicly-known distribution
pm(
α). If Eq.
11holds for
j= 1, 2,
…,
n, then TTP confirms the validity of the commitment on the contract
Cwhile signing an authorized document for all clients to declare that the hash value
H(
C,
I,
t) is valid, and the binding phase is completed. Otherwise, TTP continues to perform the next step.
(2) TTP performs a similar check on the testimonies I, H(C, I, t) and submitted by P2.
(3) The similar procedure is repeated until the check on the last client Pk’s testimonies is completed.
Finally, if all the k clients’ testimonies cannot pass the check, TTP declares that the commitment on the contract C is invalid. Finally, he keeps the verdict in both cases.
4 The analysis
4.1 Correctness
Theorem 1. Either each of n clients gets the other n − 1 ones’ commitment on the contract C, or none of them gets any commitment on the contract C in the above protocol.
Proof. It can be seen that if all n clients perform this protocol honestly in the exchanging phase, then each of them will get the other n − 1 clients’ commitment on the contract C. In the binding phase, TTP signs an authorized document for all clients to confirm the validity of commitment on the contract C, or declares that the commitment on the contract C is invalid, which means that either each of n clients gets the others’ commitment, or none of them gets any commitment in both cases.
Therefore, this protocol can be correctly completed.
4.2 Optimistic
In an ideal scenario, all clients perform this protocol honestly, then each will get the other n − 1 clients’ commitment on the contract C simultaneously. In this case, TTP does not need to be involved, and therefore this protocol is optimistic.
4.3 Fairness
As we know, if a cryptographic protocol is secure against participant attacks, then it must be also secure for external opponents. This is also the case for quantum contract signing, and therefore the main security goal of this protocol is to prevent the attacks from legal participants, i.e., how to guarantee the fairness that each client will get the others’ commitment or none of them will get the commitment from anyone else [9, 23–27].
As mentioned in Section 2, a cryptographic hash function H(⋅) is used to generate a digest in this protocol. Clearly, if a dishonest client has unlimited computational resources, then he can find a collision, i.e., H(C‖I‖t) = H(C′‖I‖t), which will give him a good chance to bind a different contract C′. Nevertheless, as pointed out in [24], “given a particular hash function H(⋅), it is negligible that other collisions different from the contract C would still represent meaningful contracts, let alone contracts that would be favorable to the dishonest one”. Consequently, we do not consider the collision attack any longer here.
Before proving the fairness, we firstly define some probabilities as follows.: Probability that Pa passes TTP’s test on Pb’s bits for , hereafter a, b ∈ {1, 2, …, n}.: Probability that Pb passes TTP’s test on Pa’s bits for .: Probability that Pb passes Pa’s test on his bits for .: Probability that Pa passes Pb’s test on his bits for .
It should be noted that the communication channels in this protocol are authenticated, and thus the attacks from external opponents need not be considered. Consequently, we only consider the possible participant attacks: one is dishonest clients want to get the others’ commitment on the contract C but make the others not obtain theirs by sending fake bits in the exchanging phase, and the other is that they send forgery testimonies to TTP in the binding phase in order to get a certified copy of the different contract C′.
Firstly, we analyze the possibility of the first kind of attack. Without loss of generality, assume that Pb is a dishonest client who wants to get Pa’s commitment on the contract C but make Pa not obtain his in the exchanging phase. To attain this goal, a possible way is to send some fake bits to Pa in the exchanging phase. Nevertheless, he must make Pa’s testimony sent by himself not satisfy Eq.13, i.e.,which means when the communication was interrupted at the mth round, he must send at least (1 − α)nt such that satisfies and,but, . Since Pb has no way to distinguish the index i of from and , his deception will be detected by Pa with the probabilitywhich is exponentially close to 1. Therefore, the successful probabilityfor Pb to cheat is negligible. Furthermore, when a dispute appears, TTP will sign an authorized document for all clients to declare that the hash value h* = H(C, I, t) is valid, whereby each can obtain a certified copy of the contract C, which implies that the difference between Pa’s probability and Pb’s probability to bind the contract C is equal to Pch(m, α), i.e.,here ɛ is any given real positive number.
Secondly, we analyze the possibility of the second kind of attack. Without loss of generality, we also assume that Pb is dishonest. Differing from the first one, Pb directly forges the testimonies H(C′, I, t) and in this case, and then sends them to TTP for getting a certified copy of forgery contract C′. To attain this goal, he must make them satisfy Eq. 12, i.e.,
That is to say, when the communication is interrupted at the mth round, he must forge at least αnt such that satisfies , , and , . For each , it will be in and with the probability and , respectively. Furthermore, when the index i is in , the probability that matches with is not more than . Therefore, the successful probability iswhich is exponentially close to 0, here , the notation ⌈⋅⌉ denotes the top integral function, and . Accordingly, the successful probability for Pb to cheat is also negligible. Note that we can adjust the threshold value α according to both the practical noise and measurement errors to guarantee its security in a non-ideal case, the analysis is similar.
4.4 Efficiency
Compared with two-party protocols in [23–27], the number n of clients in this protocol can be larger than three and is flexible. Nevertheless, this protocol needs to prepare and transit o(nN) qubits, which is about times of two-party protocols. At the same time, it requires to transit o(2N(n + 1) (n − 1)) bits, which is also about times of two-party protocols. Therefore, both the communication complexity and resource consumption is about times of two-party protocols, which means its efficiency is about of two-party protocols.
5 Conclusion
To sum up, we firstly study the design of multiparty quantum contract signing and give a specific protocol. The analysis shows that it is optimistic and fair. Furthermore, this protocol does not need long-time quantum storage, and therefore can be realized with current technology. We hope this work can provide more enlightenment for the future practicability of multiparty electronic contract signing protocol.
Statements
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material, further inquiries can be directed to the corresponding author.
Author contributions
Z-FL, Analyzed the protocol, Prepared the figures, Wrote the main manuscript text. R-JY: Analyzed the protocol. X-QC: Proposed the protocol. T-YW: Analyzed the protocol.
Funding
This work was supported by the National Natural Science Foundation of China (Grant Nos. 62272208, 62172196 and 61902166), the Guangxi Key Laboratory of Trusted Software (Grant No. KX202040), the Postgraduate Education Reform Project of Henan Province (Grant No. 2019-SJGLX094Y), and the Natural Science Foundation of Henan Province (Grant No. 212300410062).
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
Supplementary material
The Supplementary Material for this article can be found online at: https://www.frontiersin.org/articles/10.3389/fphy.2023.1154415/full#supplementary-material
References
1.
AsokanNShoupVWaidnerMOptimistic fair exchange of digital signatures. IEEE J Selected Areas Commun (2000) 18(4):593–610. 10.1109/49.839935
2.
Ben-OrMGoldreichOMicaliSRivestR. A fair protocol for signing contracts. IEEE Trans Inf Theor (1990) 36(1):40–6. 10.1109/18.50372
3.
AsokanNSchunterMWaidnerMOptimistic protocols for fair exchange. In: Proceedings of the 4th ACM Conference on Computer and Communications Security. New York: ACM (1997). p. 7–17.
4.
ZhangLZhangHLYuJXianH. Blockchain-based two-party fair contract signing scheme. Inf Sci (2020) 535:142–55. 10.1016/j.ins.2020.05.054
5.
WangGLAn abuse-free fair contract-signing protocol based on the rsa signature. IEEE Trans Inf Forensics Security (2010) 5(1):158–68. 10.1109/tifs.2009.2035972
6.
RayIRayIFair exchange in e-commerce. SIGecom Exch (2002) 3(2):9–17. 10.1145/844340.844345
7.
RayIRayIAn optimistic fair exchange e-commerce protocol with automated dispute resolution. In: BauknechtKKumar MadriaSPernulG, editors. Electronic commerce and web technologies. Berlin, Heidelberg: Springer Berlin Heidelberg (2000). p. 84–93.
8.
ZhouNRZhangTFXieXWWuJY. Hybrid quantum–classical generative adversarial networks for image generation via learning discrete distribution. Signal Processing: Image Commun (2023) 110:116891. 10.1016/j.image.2022.116891
9.
PaunkovićNBoudaJMateusPFair and optimistic quantum contract signing. Phys Rev A (2011) 84:062331. 10.1103/physreva.84.062331
10.
EvenSYacobiYRelations among public key signature systems. Technical report. Haifa: Computer Science Department, Technion (1980).
11.
PagniaHGärtnerFCOn the impossibility of fair exchange without a trusted third party. Citeseer: Technical report (1999).
12.
ZhouJYGollmanDA fair non-repudiation protocol. In: Proceedings 1996 IEEE Symposium on Security and Privacy; May 1996; Oakland, CA, USA. IEEE (1996). p. 55–61.
13.
FengBRobertHDMaoWBEfficient and practical fair exchange protocols with off-line ttp. In: Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No. 98CB36186); May 1998; Oakland, CA, USA. IEEE (1998). p. 77–85.
14.
GarayJAMacKenziePAbuse-free multi-party contract signing. In: PrasadJ, editor. Distributed computing. Berlin, Heidelberg: Springer Berlin Heidelberg (1999). p. 151–66.
15.
Baum-WaidnerBOptimistic asynchronous multi-party contract signing with reduced number of rounds. In: Automata, Languages and Programming: 28th International Colloquium, ICALP 2001 Crete; July 8–12, 2001; Greece. Springer (2001). p. 898–911. Proceedings.
16.
Ferrer-GomilaJLHinarejosMFAndreu-PereIDA fair contract signing protocol with blockchain support. Electron Commerce Res Appl (2019) 36:100869. 10.1016/j.elerap.2019.100869
17.
GuoLJLiXLGaoJTMulti-party fair exchange protocol with smart contract on bitcoin. Int J Netw Secur (2019) 21(1):71–82.
18.
ChenYAZhangQChenTYCaiWQLiaoSKZhangJet alAn integrated space-to-ground quantum communication network over 4,600 kilometres. Nature (2021) 589(7841):214–9. 10.1038/s41586-020-03093-8
19.
ChenLLLiQLiuCDPengYYuF. Efficient mediated semi-quantum key distribution. Physica A: Stat Mech its Appl (2021) 582:126265. 10.1016/j.physa.2021.126265
20.
CaiXQLiuZFWeiCYWangTY. Long distance measurement-device-independent three-party quantum key agreement. Physica A: Stat Mech its Appl (2022) 607:128226. 10.1016/j.physa.2022.128226
21.
LiuJLiQQuanJYWangCShiJSituH. Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation. Designs, Codes and Cryptography (2022) 90(3):577–91. 10.1007/s10623-021-00993-2
22.
WangYLouXPZhouFWangSHuangS. Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk. Int J Theor Phys (2022) 61(2):1–17. 10.1007/s10773-022-05009-w
23.
ChouYHTsaiIMKoCMKouSChenIQuantum oblivious transfer and fair digital transactions. In: Proceeding of the 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC’06); December 2006; Riverside, CA, USA. IEEE (2006). p. 121–8.
24.
YadavPMateusPPaunkovićNSoutoA. Quantum contract signing with entangled pairs. Entropy (2019) 21(9):821. 10.3390/e21090821
25.
CaiXQWangXXWangTYFair and optimistic contract signing based on quantum cryptography. Int J Theor Phys (2019) 58(11):3677–83. 10.1007/s10773-019-04236-y
26.
CaoTChangYYanLLWangQ. Quantum electronic contract scheme based on single photon. CMC-Computers Mater Continua (2020) 65(2):1507–17. 10.32604/cmc.2020.010213
27.
CaiXQWangTYWeiCYGaoF. Practical quantum contract signing without quantum storage. Quan Inf Process (2022) 21(2):58. 10.1007/s11128-021-03406-4
Summary
Keywords
quantum cryptography, quantum contract signing, fairness, participant attack, electronic contract
Citation
Liu Z-F, Yang R-J, Cai X-Q and Wang T-Y (2023) Multiparty quantum contract signing. Front. Phys. 11:1154415. doi: 10.3389/fphy.2023.1154415
Received
30 January 2023
Accepted
24 April 2023
Published
05 May 2023
Volume
11 - 2023
Edited by
Nanrun Zhou, Shanghai University of Engineering Sciences, China
Reviewed by
Xiaoping Lou, Hunan Normal University, China
Hao Cao, Anhui Science and Technology University, China
Updates
Copyright
© 2023 Liu, Yang, Cai and Wang.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Tian-Yin Wang, wangtianyin79@163.com; Xiao-Qiu Cai, xiaoqiucai@aliyun.com
Disclaimer
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.