Access the full text.
Sign up today, get DeepDyve free for 14 days.
X.J. Wen, X.M. Niu, L.P. Jia (2009)
A weak blind signature scheme based on quantum cryptographyOpt. Commun., 282
Y.G. Yang, Q.Y. Wen, F.C. Zhu (2008)
Multi-proxy quantum group signature scheme with threshold shared verificationChin. Phys. B, 17
T.Y. Wang, Q.Y. Wen (2010)
Fair quantum blind signaturesChin. Phys. B, 19
T.Y. Wang, Q.Y. Wen, X.B. Chen (2008)
An efficient and secure multiparty quantum secret sharing scheme based on single photonsOpt. Commun., 281
F. Cao, Z.F. Cao (2009)
A secure identity-based proxy multi-signature schemeInf. Sci., 179
G.H. Zeng, H.K. Christoph (2002)
Arbitrated quantum-signature schemePhys. Rev. A, 65
S.J. Qin, Q.Y. Wen, L.M. Meng (2009)
Quantum secure direct communication over the collective amplitude damping channelSci. China. Ser. G, 52
P. Shor (1997)
Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computerSIAM J. Comput., 26
X.H. Li, F.G. Deng, H.Y. Zhou (2008)
Efficient quantum key distribution over a collective noise channelPhys. Rev. A, 78
C.H. Bennett (1992)
Quantum cryptography using any two nonorthogonal statesPhys. Rev. Lett., 68
D.A. Lidar, I.L. Chang, K.B. Whaley (1998)
Decoherence-free subspaces for quantum computationPhys. Rev. Lett., 81
A. Cabello (2007)
Six-qubit permutation-based decoherence-free orthogonal basisPhys. Rev. A, 75
T.Y. Wang, Q.Y. Wen (2011)
Security of a kind of quantum secret sharing with single photonsQuant. Inf. Comput., 11
Y.G. Yang, Z. Zhou, Y.W. Teng (2011)
Arbitrated quantum signature with an untrusted arbitratorThe Euro. Phys. J. D, 61
T.Y. Wang, X.Q. Cai, J.Z. Zhang (2007)
Off-line e-cash system with multiple banks based on elliptic curveComput. Eng. Appl., 33
J.C Boileau, R. Laflamme, M. Laforest (2004)
Robust quantum communication using a polarization-entangled photon pairPhys. Rev. Lett., 93
M. Mambo, K. Usuda, E. Okamoto (1996)
Proxy signature: delegation of the power to sign messagesIEICE Trans. Fundam., E79
L.K. Grover (1998)
Quantum computers can search rapidly by using almost any transformationPhys. Rev. Lett., 80
K. Majgier, H. Maassen, K. Zyczkowski (2010)
Protected subspaces in quantum informationQuant. Inf. Proc., 9
H. Lee, C. Hong, H. Kim, J. Lim (2004)
Arbitrated quantum signature scheme with message recoveryPhys. Lett. A, 321
T.Y. Wang, Q.Y. Wen, F. Gao (2008)
Cryptanalysis and improvement of multiparty quantum secret sharing schemesPhys. Lett. A, 373
M. Mehta, L. Harn (2005)
Efficient one-time proxy signaturesIEE Proc. Commun., 152
Z.D. Walton, A.F. Abouraddy, A.V. Sergienko (2003)
Decoherence-free subspaces in quantum key distributionPhys. Rev. Lett., 91
Q. Li, W.H. Chan, D.Y. Long (2009)
Arbitrated quantum signature scheme using Bell statesPhys. Rev. A, 79
T.Y. Wang, Q.Y. Wen, F.C. Zhu (2009)
Secure authentication of classical messages with decoherence-free statesOpt. Commun., 282
K. Bicakci (2007)
One-time proxy signatures revisitedComput. Stand. Interfaces, 29
T.Y. Wang, Q.Y. Wen, F.C. Zhu (2010)
Economical quantum anonymous transmissionsJ. Phys. B: At. Mol. Opt. Phys., 43
X.B. Wang (2005)
Fault tolerant quantum key distribution protocol with collective random unitary noisePhys. Rev. A, 72
Y. Sun, Q.Y. Wen, F. Gao (2009)
Robust variations of the Bennett-Brassard 1984 protocol against collective noisePhys. Rev. A, 80
We propose a new one-time proxy signature scheme with decoherence-free states. We analyze its security and show that it is not possible to forge a valid proxy signature even if an opponent has infinite resources. Furthermore, the differences between this scheme and others are discussed.
Quantum Information Processing – Springer Journals
Published: Jul 20, 2011
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.