Skip to main content
Erschienen in: Quantum Information Processing 12/2022

01.12.2022

Provably secure arbitrated-quantum signature

verfasst von: Xiangjun Xin, Li Ding, Tianyuan Zhang, Qinglan Yang, Chaoyang Li

Erschienen in: Quantum Information Processing | Ausgabe 12/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although the researchers have proposed many arbitrator quantum signature (AQS) for various applications in practice, the security proof of most AQSs was not strictly presented. Many results have shown that the AQS schemes without strict security proof may be broken by various measurement and forgery attacks. Therefore, a secure AQS should strictly put its security on the quantum theorems and principles. Based on the non-orthogonal entangled-triple sequence, an AQS with provable security is proposed. First, the theoretical security proof of our AQS is presented. Second, we prove the non-cloning theorem for the entangled-triple sequence. Third, by using the non-cloning property of the entangled-triple particle, we prove the new AQS signature cannot be forged. At last, the non-repudiation of the proposed AQS is analyzed. We showed that if an adversary can break the signature, his/her actions will violate some quantum principles. The security proof of the proposed signature scheme also shows the idea of provable security for a quantum signature. On the other hand, in the proposed scheme, the partners need not perform the probabilistic quantum state comparison test. It has better qubit efficiency. Therefore, compared with the other similar schemes, ours has the better merits in security and efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetMATH Diffie, W., Hellman, M.E.: New direction in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)MathSciNetMATH
2.
Zurück zum Zitat Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(5), 1338–1354 (1996) Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79-A(5), 1338–1354 (1996)
3.
Zurück zum Zitat Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advance in Cryptology-CRYPTO’82, pp. 199–203. Springer, Boston (1983) Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advance in Cryptology-CRYPTO’82, pp. 199–203. Springer, Boston (1983)
4.
Zurück zum Zitat Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) Advance in cryptology- EUROCRYPT’91, pp. 257–265. Springer, Berlin (1991) Chaum, D., Heyst, E.: Group signatures. In: Davies, D.W. (ed.) Advance in cryptology- EUROCRYPT’91, pp. 257–265. Springer, Berlin (1991)
5.
Zurück zum Zitat Rastegari, P., Berenjkoub, M., Dakhilalian, M., et al.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inform. Sci. 479, 321–334 (2019)MathSciNetMATH Rastegari, P., Berenjkoub, M., Dakhilalian, M., et al.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inform. Sci. 479, 321–334 (2019)MathSciNetMATH
6.
Zurück zum Zitat Rastegari, P., Susilo, W., Dakhilalian, M.: Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. Int. J. Inf. Secur. 18(5), 619–665 (2019) Rastegari, P., Susilo, W., Dakhilalian, M.: Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model. Int. J. Inf. Secur. 18(5), 619–665 (2019)
7.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adelman, L.: A method for obtain digital signatures and public-key cryptosystem. Commun. ACM 21(2), 120–126 (1978)MATH Rivest, R.L., Shamir, A., Adelman, L.: A method for obtain digital signatures and public-key cryptosystem. Commun. ACM 21(2), 120–126 (1978)MATH
8.
Zurück zum Zitat Cha, C.J., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: PKC 2003, Springer, Berlin, pp. 18–30 (2003) Cha, C.J., Cheon, J.H.: An identity-based signature from gap Diffie-Hellman groups. In: PKC 2003, Springer, Berlin, pp. 18–30 (2003)
9.
Zurück zum Zitat Shor, P. W.: Algorithms for quantum computation: discrete logarithm and factoring. In: Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, IEEE Computer Society Press, pp. 124–134 (1994) Shor, P. W.: Algorithms for quantum computation: discrete logarithm and factoring. In: Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, IEEE Computer Society Press, pp. 124–134 (1994)
10.
Zurück zum Zitat Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATH Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)MathSciNetMATH
11.
Zurück zum Zitat Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)ADS Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328 (1997)ADS
12.
Zurück zum Zitat Huang, Y., Su, Z., Zhang, F., Ding, Y.: Quantum algorithm for solving hyperelliptic curve discrete logarithm problem. Quantum Inf. Process. 19(62), 1–17 (2020)MathSciNetADS Huang, Y., Su, Z., Zhang, F., Ding, Y.: Quantum algorithm for solving hyperelliptic curve discrete logarithm problem. Quantum Inf. Process. 19(62), 1–17 (2020)MathSciNetADS
13.
Zurück zum Zitat Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv: quant-ph/0105032 (2001) Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv: quant-ph/0105032 (2001)
14.
Zurück zum Zitat Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADS Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)ADS
15.
Zurück zum Zitat Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADS Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773–778 (2011)ADS
16.
Zurück zum Zitat Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 51(7), 2135–2142 (2012)MATH Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 51(7), 2135–2142 (2012)MATH
17.
Zurück zum Zitat Jiang, D.H., Xu, Y.L., Xu, G.B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 1036–1045 (2019)MathSciNetMATH Jiang, D.H., Xu, Y.L., Xu, G.B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 1036–1045 (2019)MathSciNetMATH
18.
Zurück zum Zitat Wang, M.Q., Wang, X., Zhan, T.: An efficient quantum digital signature for classical messages. Quantum Inf. Process. 17(10), 275 (2018)MathSciNetMATHADS Wang, M.Q., Wang, X., Zhan, T.: An efficient quantum digital signature for classical messages. Quantum Inf. Process. 17(10), 275 (2018)MathSciNetMATHADS
19.
Zurück zum Zitat Liang, X.Q., Wu, Y.L., Zhang, Y.H., Wang, S.S., Xu, G.B.: Quantum multi-proxy blind signature scheme based on four-qubit cluster states. Int. J. Theor. Phys. 58(1), 31–39 (2019)MATH Liang, X.Q., Wu, Y.L., Zhang, Y.H., Wang, S.S., Xu, G.B.: Quantum multi-proxy blind signature scheme based on four-qubit cluster states. Int. J. Theor. Phys. 58(1), 31–39 (2019)MATH
20.
Zurück zum Zitat Qin, H., Tang, W.K.S., Tso, R.: Efficient quantum multi-proxy signature. Quantum Inf. Process. 18(2), 53 (2019)MathSciNetMATHADS Qin, H., Tang, W.K.S., Tso, R.: Efficient quantum multi-proxy signature. Quantum Inf. Process. 18(2), 53 (2019)MathSciNetMATHADS
21.
Zurück zum Zitat Xin, X., Wang, Z., Yang, Q., Li, F.: Quantum designated verifier signature based on Bell states. Quantum Inf. Process. 19(79), 53 (2020)MathSciNetADS Xin, X., Wang, Z., Yang, Q., Li, F.: Quantum designated verifier signature based on Bell states. Quantum Inf. Process. 19(79), 53 (2020)MathSciNetADS
22.
Zurück zum Zitat Su, Q., Li, W.M.: Improved quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 52(9), 3343–3352 (2013)MathSciNetMATH Su, Q., Li, W.M.: Improved quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 52(9), 3343–3352 (2013)MathSciNetMATH
23.
Zurück zum Zitat Xin, X., He, Q., Wang, Z., Yang, Q., Li, F.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)ADS Xin, X., He, Q., Wang, Z., Yang, Q., Li, F.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23–31 (2019)ADS
24.
Zurück zum Zitat Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocol. Phys. Rev. A 84, 022344 (2011)ADS Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocol. Phys. Rev. A 84, 022344 (2011)ADS
25.
Zurück zum Zitat Li, Q., Chan, W.H., Log, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)MathSciNetADS Li, Q., Chan, W.H., Log, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)MathSciNetADS
26.
Zurück zum Zitat Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010) Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 23504–23516 (2010)
27.
Zurück zum Zitat Li, W., Shi, R., Huang, D., et al.: Quantum blind dual-signature scheme without arbitrator. Phys. Scr. 91, 035101 (2016)ADS Li, W., Shi, R., Huang, D., et al.: Quantum blind dual-signature scheme without arbitrator. Phys. Scr. 91, 035101 (2016)ADS
28.
Zurück zum Zitat Xia, C., Li, H., Hu, J.: A semi-quantum blind signature protocol based on five-particle GHZ state. Eur. Phys. J. Plus 136, 633 (2021) Xia, C., Li, H., Hu, J.: A semi-quantum blind signature protocol based on five-particle GHZ state. Eur. Phys. J. Plus 136, 633 (2021)
29.
Zurück zum Zitat Zhou, B.M., Lin, L.D., Wang, W., et al.: Security analysis of particular quantum proxy blind signature against the forgery attack. Int. J. Theor. Phys. 59, 465–473 (2020)MathSciNetMATH Zhou, B.M., Lin, L.D., Wang, W., et al.: Security analysis of particular quantum proxy blind signature against the forgery attack. Int. J. Theor. Phys. 59, 465–473 (2020)MathSciNetMATH
30.
Zurück zum Zitat Liu, G., Ma, W.P., Cao, H., et al.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theor. Phys. 58, 1999–2008 (2019)MathSciNetMATH Liu, G., Ma, W.P., Cao, H., et al.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theor. Phys. 58, 1999–2008 (2019)MathSciNetMATH
31.
Zurück zum Zitat Ding, L., Xin, X., Yang, Q., et al.: Security analysis and improvements of XOR arbitrated quantum signature-based GHZ state. Mod. Phys. Lett. A 37(2), 2250008 (2022)MathSciNetADS Ding, L., Xin, X., Yang, Q., et al.: Security analysis and improvements of XOR arbitrated quantum signature-based GHZ state. Mod. Phys. Lett. A 37(2), 2250008 (2022)MathSciNetADS
32.
Zurück zum Zitat Zheng, X.Y., Kuang, C.: Arbitration quantum signature protocol based on XOR encryption. Int. J. Quantum Inf. 18, 2050025 (2020)MathSciNetMATH Zheng, X.Y., Kuang, C.: Arbitration quantum signature protocol based on XOR encryption. Int. J. Quantum Inf. 18, 2050025 (2020)MathSciNetMATH
33.
Zurück zum Zitat He, Q., Xin, X., Yang, Q.: Security analysis and improvement of a quantum multi-signature protocol. Quantum Inf. Process. 20, 26 (2021)MathSciNetADS He, Q., Xin, X., Yang, Q.: Security analysis and improvement of a quantum multi-signature protocol. Quantum Inf. Process. 20, 26 (2021)MathSciNetADS
34.
Zurück zum Zitat Jiang, D.H., Hu, Q.Z., Liang, X.Q., et al.: A novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Quantum Inf. Process. 18(9), 268 (2019)MathSciNetADS Jiang, D.H., Hu, Q.Z., Liang, X.Q., et al.: A novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Quantum Inf. Process. 18(9), 268 (2019)MathSciNetADS
35.
Zurück zum Zitat Zhang, L., Sun, H.W., Zhang, K.J., et al.: The security problems in some novel arbitrated quantum signature protocols. Int. J. Theor. Phys. 56, 2433–2444 (2017)MATHADS Zhang, L., Sun, H.W., Zhang, K.J., et al.: The security problems in some novel arbitrated quantum signature protocols. Int. J. Theor. Phys. 56, 2433–2444 (2017)MATHADS
36.
Zurück zum Zitat Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADS Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)ADS
37.
Zurück zum Zitat Xu, G., Zou, X.: Security analysis of an arbitrated quantum signature scheme with Bell states. Int. J. Theor. Phys. 55, 4142–4156 (2016)MathSciNetMATH Xu, G., Zou, X.: Security analysis of an arbitrated quantum signature scheme with Bell states. Int. J. Theor. Phys. 55, 4142–4156 (2016)MathSciNetMATH
38.
Zurück zum Zitat Liu, F., Zhang, K., Cao, T.: Security weaknesses in arbitrated quantum signature protocols. Int. J. Theor. Phys. 53, 277–288 (2014)MathSciNetMATH Liu, F., Zhang, K., Cao, T.: Security weaknesses in arbitrated quantum signature protocols. Int. J. Theor. Phys. 53, 277–288 (2014)MathSciNetMATH
39.
Zurück zum Zitat Wang, J., Zhang, Q., Tang, C.J.: Efficient quantum signature protocol of classical messages. J. Commun. 28(1), 64–68 (2003) Wang, J., Zhang, Q., Tang, C.J.: Efficient quantum signature protocol of classical messages. J. Commun. 28(1), 64–68 (2003)
40.
Zurück zum Zitat Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADS Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112(4), 040502 (2014)ADS
41.
Zurück zum Zitat Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADS Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91(4), 042304 (2014)ADS
42.
Zurück zum Zitat Amiri, R., Wallden, P., Kent, A., et al.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADS Amiri, R., Wallden, P., Kent, A., et al.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93(3), 032325 (2016)ADS
43.
Zurück zum Zitat Lu, D., Li, Z., Yu, J., et al.: A verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. Entropy (Basel) 24(1), 111 (2022)MathSciNetADS Lu, D., Li, Z., Yu, J., et al.: A verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. Entropy (Basel) 24(1), 111 (2022)MathSciNetADS
44.
Zurück zum Zitat Zou, X.F., Qiu, D.W., Mateus, P.: Security Analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATH Zou, X.F., Qiu, D.W., Mateus, P.: Security Analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52(9), 3295–3305 (2013)MathSciNetMATH
45.
Zurück zum Zitat Zhang, M.L., Liu, Y.H., Nie, M., et al.: Arbitrated quantum signature of quantum messages with a semi-honest arbitrator. Int. J. Theor. Phys. 57, 1310–1318 (2018)MathSciNetMATH Zhang, M.L., Liu, Y.H., Nie, M., et al.: Arbitrated quantum signature of quantum messages with a semi-honest arbitrator. Int. J. Theor. Phys. 57, 1310–1318 (2018)MathSciNetMATH
46.
Zurück zum Zitat Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)MathSciNetMATHADS Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655–2669 (2013)MathSciNetMATHADS
47.
Zurück zum Zitat Zhang, L., Sun, H.W., Zhang, K.J., et al.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 70 (2017)MathSciNetMATHADS Zhang, L., Sun, H.W., Zhang, K.J., et al.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16(3), 70 (2017)MathSciNetMATHADS
48.
Zurück zum Zitat Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28–38 (2014)MathSciNetMATH Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28–38 (2014)MathSciNetMATH
49.
Zurück zum Zitat Liu, F., Qin, S.J., Huang, W.: An arbitrated quantum signature with Bell states. Int. J. Theor. Phys 53(5), 1569–1579 (2014)MathSciNetMATH Liu, F., Qin, S.J., Huang, W.: An arbitrated quantum signature with Bell states. Int. J. Theor. Phys 53(5), 1569–1579 (2014)MathSciNetMATH
50.
Zurück zum Zitat Li, Q., Li, C.Q., Long, D.Y., et al.: Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7), 2427 (2013)MathSciNetMATHADS Li, Q., Li, C.Q., Long, D.Y., et al.: Efficient arbitrated quantum signature and its proof of security. Quantum Inf. Process. 12(7), 2427 (2013)MathSciNetMATHADS
51.
Zurück zum Zitat Li, Q., Du, R.G., Long, D.Y., et al.: Entanglement enhances the security of arbitrated quantum signature. Int. J. Quantum Inf. 7(5), 913 (2009)MATH Li, Q., Du, R.G., Long, D.Y., et al.: Entanglement enhances the security of arbitrated quantum signature. Int. J. Quantum Inf. 7(5), 913 (2009)MATH
52.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)MathSciNetMATH Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7–11 (2014)MathSciNetMATH
53.
Zurück zum Zitat Menezes, A.J., Oorschot, P.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)MATH Menezes, A.J., Oorschot, P.V., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)MATH
54.
Zurück zum Zitat Yang, L., Yang, B., Pan J.: Quantum public-key encryption with information theoretic security. In: Proceedings of SPIE, vol. 8440, p. 84400E-17 (2010) Yang, L., Yang, B., Pan J.: Quantum public-key encryption with information theoretic security. In: Proceedings of SPIE, vol. 8440, p. 84400E-17 (2010)
55.
Zurück zum Zitat Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption scheme based on conjugate coding. China Commun. 10(2), 19–26 (2013) Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption scheme based on conjugate coding. China Commun. 10(2), 19–26 (2013)
56.
Zurück zum Zitat Chen, F.L., Zhang, L.H., Zhang, H.: Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes. Quantum Inf. Process. 18, 140 (2019)MathSciNetMATHADS Chen, F.L., Zhang, L.H., Zhang, H.: Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes. Quantum Inf. Process. 18, 140 (2019)MathSciNetMATHADS
57.
Zurück zum Zitat Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003) Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 645–648 (2003)
58.
Zurück zum Zitat Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADS Buhrman, H., Cleve, R., Watrous, J., de Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)ADS
59.
Zurück zum Zitat Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with 100% qubit efficiency. IET Inf. Secur. 1(1), 43–45 (2007) Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with 100% qubit efficiency. IET Inf. Secur. 1(1), 43–45 (2007)
Metadaten
Titel
Provably secure arbitrated-quantum signature
verfasst von
Xiangjun Xin
Li Ding
Tianyuan Zhang
Qinglan Yang
Chaoyang Li
Publikationsdatum
01.12.2022
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 12/2022
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-022-03730-3

Weitere Artikel der Ausgabe 12/2022

Quantum Information Processing 12/2022 Zur Ausgabe