Access the full text.
Sign up today, get DeepDyve free for 14 days.
Song Lin, Q. Wen, F. Gao, F. Zhu (2008)
Quantum secure direct communication with χ -type entangled statesPhysical Review A, 78
F. Gao, Q. Wen, F. Zhu (2006)
Comment on: “Quantum exam” [Phys. Lett. A 350 (2006) 174]Physics Letters A, 360
Miao Zhang, Guo-Ai Xu, Xiubo Chen, Shuai Yang, Yixian Yang (2013)
Attack on the Improved Quantum Blind Signature ProtocolInternational Journal of Theoretical Physics, 52
(2006)
Trojan-horse attacks on quantum-keydistribution systems
Jinjing Shi, Ronghua Shi, Ying Guo, Xiaoqi Peng, Ying Tang (2013)
Batch proxy quantum blind signature schemeScience China Information Sciences, 56
Tian-Yin Wang, Qiao-yan Wen (2010)
Fair quantum blind signaturesChinese Physics B, 19
Z. Walton, A. Abouraddy, A. Sergienko, B. Saleh, M. Teich (2003)
Decoherence-free subspaces in quantum key distribution.Physical review letters, 91 8
W. 黄, Q. 温, Heng-Yue 贾, Su-Juan 秦, F. 高 (2012)
Fault tolerant quantum secure direct communication with quantum encryption against collective noiseChinese Physics B, 21
M. Curty, N. Lutkenhaus (2008)
Comment on ``Arbitrated quantum-signature scheme''Physical Review A, 77
Wen Xiao-jun (2010)
An E-payment system based on quantum group signaturePhysica Scripta, 82
S. Qin, F. Gao, Q. Wen, F. Zhu (2006)
Improving the security of multiparty quantum secret sharing against an attack with a fake signalPhysics Letters A, 357
F. Guo, S. Qin, F. Gao, S. Lin, Qiao-yan Wen, F. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingThe European Physical Journal D, 56
Xiaojun Wen, X. Niu, Liping Ji, Yuan Tian (2009)
A weak blind signature scheme based on quantum cryptographyOptics Communications, 282
Zeng Gui-hua (2001)
Signature Scheme Based on Quantum Cryptography
Qin Li, W. Chan, Dongyang Long (2009)
Arbitrated quantum signature scheme using Bell statesPhysical Review A, 79
Jinjing Shi, Ronghua Shi, Ying Tang, M. Lee (2011)
A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transformQuantum Information Processing, 10
Hwayean Lee, C. Hong, Hyunsang Kim, Jongin Lim, H. Yang (2004)
Arbitrated quantum signature scheme with message recoveryPhysics Letters A, 321
P. Zanardi, M. Foundation, T. fisica, P. Torino, Infm Torino (1997)
Noiseless Quantum CodesPhysical Review Letters, 79
Xiaojun Wen, Yongzhi Chen, Jun-bin Fang (2013)
An inter-bank E-payment protocol based on quantum proxy blind signatureQuantum Information Processing, 12
M. Żukowski, A. Zeilinger, M. Horne, A. Ekert (1993)
"Event-ready-detectors" Bell experiment via entanglement swapping.Physical review letters, 71 26
Xiao-Qiu Cai, Chun-Yan Wei (2013)
Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signatureQuantum Information Processing, 12
W. Xiaojun, Nie Zhe (2010)
An E-payment System Based on Quantum Blind and Group Signature2010 Second International Symposium on Data, Privacy, and E-Commerce
Charles Bennett (1992)
Quantum cryptography using any two nonorthogonal states.Physical review letters, 68 21
A. Ekert (1991)
Quantum cryptography based on Bell's theorem.Physical review letters, 67 6
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
Wei Huang, F. Guo, Zheng Huang, Q. Wen, F. Zhu (2011)
Three-particle QKD protocol against a collective noiseOptics Communications, 284
Chun-Wei Yang, T. Hwang, Yi-Ping Luo (2013)
Enhancement on “quantum blind signature based on two-state vector formalism”Quantum Information Processing, 12
Ruiwen Xu, Liusheng Huang, Wei Yang, Libao He (2011)
Quantum group blind signature scheme without entanglementOptics Communications, 284
Guihua Zeng, C. Keitel (2001)
Arbitrated quantum-signature schemePhysical Review A, 64
Song Lin, F. Gao, F. Guo, Q. Wen, F. Zhu, Zhan-Jun Zhang, Zhong-Xiao Man (2007)
Comment on: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Authors' replyPhysical Review A, 76
R Rivest (1997)
Fast Software Encryption, Lecture Notes in Computer Science
F. Gao, S. Qin, Q. Wen, F. Zhu (2010)
Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger stateOptics Communications, 283
F. Gao, S. Qin, F. Guo, Q. Wen (2011)
Cryptanalysis of the arbitrated quantum signature protocols
XR Yin, WP Ma, WY Liu (2012)
A blind quantum signature scheme with $$\chi $$ χ -type entangled statesInt. J. Theor. Phys., 51
S Lin, F Gao, FZ Guo, QY Wen, FC Zhu (2007)
Comment on “multiparty quantum secret sharing of classical messages based on entanglement swapping”Phys. Rev. A, 76
R. Rivest (1997)
All-or-Nothing Encryption and the Package Transform
Xiangfu Zou, Daowen Qiu (2010)
Security analysis and improvements of arbitrated quantum signature schemesPhysical Review A, 82
F. Gao, S. Qin, Q. Wen, F. Zhu (2007)
A simple participant attack on the brádler-dušek protocolQuantum Inf. Comput., 7
Lior Goldenberg, L. Vaidman (1995)
Quantum cryptography based on orthogonal states.Physical review letters, 75 7
Jinjing Shi, Ronghua Shi, Ying Guo, Xiaoqi Peng, M. Lee, Dongsun Park (2012)
A (t,n)-Threshold Scheme of Multi-party Quantum Group Signature with Irregular Quantum Fourier TransformInternational Journal of Theoretical Physics, 51
Ronghua Shi, Jinjing Shi, Ying Guo, M. Lee (2011)
Multiparty Quantum Group Signature Scheme with Quantum Parallel Computation2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Song Lin, Q. Wen, F. Gao, F. Zhu (2009)
Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacksPhysical Review A, 79
Jeong Choi, Ku-Young Chang, Dowon Hong (2011)
Security problem on arbitrated quantum signature schemesPhysical Review A, 84
S Lin, QY Wen, F Gao, FC Zhu (2008)
Quantum secure direct communication with $$\chi $$ χ -type entangled statesPhys. Rev. A, 78
Mingming Wang, Xiubo Chen, Xinxin Niu, Yixian Yang (2012)
Re-examining the security of blind quantum signature protocolsPhysica Scripta, 86
Su Qi, Huang Zheng, Qiao-yan Wen, Wenmin Li (2010)
Quantum blind signature based on Two-State Vector FormalismOptics Communications, 283
Guihua Zeng (2008)
Reply to “Comment on ‘Arbitrated quantum-signature scheme’ ”Physical Review A, 78
Charles Bennett, G. Brassard, N. Mermin (1992)
Quantum cryptography without Bell's theorem.Physical review letters, 68 5
Xunru Yin, Wenping Ma, Wei-yan Liu (2012)
A Blind Quantum Signature Scheme with χ-type Entangled StatesInternational Journal of Theoretical Physics, 51
F. Gao, F. Guo, Q. Wen, F. Zhu, S. Gaertner, M. Bourennane, C. Kurtsiefer, A. Cabello, H. Weinfurter (2008)
Comment on: Experimental Demonstration of a Quantum Protocol for Byzantine Agreement and Liar Detection. Authors' replyPhysical Review Letters, 101
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
F Gao, FZ Guo, QY Wen, FC Zhu (2008)
Comment on “experimental demonstration of a quantum protocol for byzantine agreement and liar detection”Phys. Rev. Lett., 101
Recently, Yang et al. (Quantum Inf Process 12(1):109, 2013) proposed an enhanced quantum blind signature based on two-taste vector formalism. The protocol can prevent signatory Bob from deriving Alice’s message with invisible photon eavesdropping attack or fake photon attack. In this paper, we show that the enhanced protocol also has a loophole that Alice can utilize an entanglement swapping attack to obtain Bob’s secret key and forge Bob’s valid signature at will later. Then, we reanalyze two existing protocols and try to find some further methods to fix them.
Quantum Information Processing – Springer Journals
Published: Jan 18, 2014
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.