Access the full text.
Sign up today, get DeepDyve free for 14 days.
F. Gao, Q. Wen, F. Zhu (2006)
Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]Physics Letters A, 360
X Yin, W Ma, W Liu (2012)
A blind quantum signature scheme with $$\chi $$ -type entangled statesInt. J. Theor. Phys., 51
Yu-Guang Yang (2008)
Multi-proxy quantum group signature scheme with threshold shared verificationChinese Physics B, 17
Tian-Yin Wang, Qiao-yan Wen (2010)
Fair quantum blind signaturesChinese Physics B, 19
Tianyin Wang, Q. Wen, Xiubo Chen (2010)
Cryptanalysis and improvement of a multi-user quantum key distribution protocolOptics Communications, 283
A. Wójcik (2002)
Eavesdropping on the "ping-pong" quantum communication protocol.Physical review letters, 90 15
Liang Hao, Jun-Lin Li, Guilu Long (2010)
Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solutionScience China Physics, Mechanics and Astronomy, 53
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
Tianyin Wang, Q. Wen, F. Zhu (2011)
Cryptanalysis of multiparty quantum secret sharing with Bell states and Bell measurementsOptics Communications, 284
Wen Xiao-jun (2010)
An E-payment system based on quantum group signaturePhysica Scripta, 82
F. Gao, F. Guo, Q. Wen, F. Zhu (2008)
Consistency of shared reference frames should be reexaminedPhysical Review A, 77
S. Qin, F. Gao, Q. Wen, F. Zhu (2006)
Improving the security of multiparty quantum secret sharing against an attack with a fake signalPhysics Letters A, 357
Xiaojun Wen, X. Niu, Liping Ji, Yuan Tian (2009)
A weak blind signature scheme based on quantum cryptographyOptics Communications, 282
Xiaojin Wen, Yun Liu, Yu Sun (2007)
Quantum Multi-Signature Protocol Based on TeleportationZeitschrift für Naturforschung A, 62
Yong-Sheng Zhang, Chuan‐Feng Li, G. Guo (2000)
Comment on “Quantum key distribution without alternative measurements” [Phys. Rev. A 61 , 052312 (2000)]Physical Review A, 63
N Gisin, S Fasel, B Kraus, H Zbinden, G Ribordy (2006)
Trojan-horse attacks on quantum-key-distribution systemsPhys. Rev. A, 73
Qin Li, W. Chan, Dongyang Long (2009)
Arbitrated quantum signature scheme using Bell statesPhysical Review A, 79
Hwayean Lee, C. Hong, Hyunsang Kim, Jongin Lim, H. Yang (2004)
Arbitrated quantum signature scheme with message recoveryPhysics Letters A, 321
H. Lo, Tsz-Mei Ko (2003)
Some attacks on quantum-based cryptographic protocolsQuantum Inf. Comput., 5
Xiaojun Wen, Yuan Tian, Liping Ji, X. Niu (2010)
A group signature scheme based on quantum teleportationPhysica Scripta, 81
Tianyin Wang, Q. Wen, F. Gao, Song Lin, F. Zhu (2008)
Cryptanalysis and improvement of multiparty quantum secret sharing schemesPhysics Letters A, 373
A. Wójcik (2004)
Comment on 'Quantum dense key distribution'Physical Review A, 71
Q. Cai (2003)
The "ping-pong" protocol can be attacked without eavesdropping.Physical review letters, 91 10
Tianyin Wang, Q. Wen (2011)
Security of a kind of quantum secret sharing with single photonsQuantum Inf. Comput., 11
F. Gao, S. Qin, F. Guo, Q. Wen (2010)
Dense-Coding Attack on Three-Party Quantum Key Distribution ProtocolsIEEE Journal of Quantum Electronics, 47
Gao Fei, Qiao-yan Wen, F. Zhu (2008)
Teleportation attack on the QSDC protocol with a random basis and orderChinese Physics B, 17
Jingxian Zhou, Yajian Zhou, Xinxin Niu, Yixian Yang (2011)
Quantum proxy signature scheme with public verifiabilityScience China Physics, Mechanics and Astronomy, 54
H. Chien, J. Jan, Yuh-Min Tseng (2001)
RSA-based partially blind signature with low computationProceedings. Eighth International Conference on Parallel and Distributed Systems. ICPADS 2001
Tianyin Wang, Zong-Li Wei (2012)
One-time proxy signature based on quantum cryptographyQuantum Information Processing, 11
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
Ruiwen Xu, Liusheng Huang, Wei Yang, Libao He (2011)
Quantum group blind signature scheme without entanglementOptics Communications, 284
Ma Ying, Tian Wei-jian, Fan Yang-yu (2011)
A Controllable Quantum Sequential Multi-signature Scheme
Guihua Zeng, C. Keitel (2001)
Arbitrated quantum-signature schemePhysical Review A, 64
Xunru Yin, Wenping Ma, Wei-yan Liu (2012)
A Blind Quantum Signature Scheme with χ-type Entangled StatesInternational Journal of Theoretical Physics, 51
Xiaojun Wen, Yun Liu, Nanrun Zhou (2008)
REALIZABLE QUANTUM BROADCASTING MULTI-SIGNATURE SCHEMEInternational Journal of Modern Physics B, 22
高飞, 林崧, 温巧燕, 朱甫臣 (2008)
A Special Eavesdropping on One-Sender Versus N-Receiver QSDC Protocol, 25
N. An (2006)
Quantum exam
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
F. Gao, S. Qin, F. Guo, Q. Wen (2011)
Cryptanalysis of the arbitrated quantum signature protocols
Guihua Zeng, M. Lee, Ying Guo, G. He (2007)
CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHMInternational Journal of Quantum Information, 05
F Gao, F Guo, Q Wen, F Zhu (2008)
Comment on “Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection”Phys. Rev. Lett., 101
The security of the recent quantum multi-signature protocol based on teleportation is analyzed. We show that there are some security vulnerabilities in the protocol. The detailed attack strategies are described from the aspect of participant attack. We also point out that the protocol is not secure against external attack. Finally, we give some possible countermeasures to improve the protocol.
Quantum Information Processing – Springer Journals
Published: Jan 29, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.