Access the full text.
Sign up today, get DeepDyve free for 14 days.
C. Elliott, David Pearson, Gregory Troxel (2003)
Quantum cryptography in practice
M Naseri (2011)
Comment on a weak blind signature based on quantum cryptographyInt. J. Phys. Sci., 6
L Harn (1995)
Cryptanalysis of the blind signature based on the discrete logarithmElectron. Lett., 31
Q. Cai (2005)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhysics Letters A, 351
D. MacMahon (2008)
Quantum Computing Explained
Charles Bennett, D. DiVincenzo (2000)
Quantum information and computationNature, 404
(1983)
Advances in cryptology, proceeding of CRYPTO'82
A. Galindo, M. Martin-Delgado (2001)
Information and computation: Classical and quantum aspectsReviews of Modern Physics, 74
G. Ribordy (2006)
Practical quantum key distribution systems based on faint laser pulses2006 Digest of the LEOS Summer Topical Meetings
W. Wootters, W. Wootters, W. Zurek (1982)
A single quantum cannot be clonedNature, 299
D. Gottesman, I. Chuang (2001)
Quantum Digital Signatures
Su Qi, Huang Zheng, Qiao-yan Wen, Wenmin Li (2010)
Quantum blind signature based on Two-State Vector FormalismOptics Communications, 283
(1983)
Blind signature for untraceable payments
Chun-I Fan, C. Lei (1996)
Efficient blind signature scheme based on quadratic residuesElectronics Letters, 32
M. Naseri (2011)
A weak blind signature based on quantum cryptographyInternational Journal of Physical Sciences, 6
Fuguo Deng, P. Zhou, Xihan Li, Chun-Yan Li, Hong-Yu Zhou (2005)
Robustness of two-way quantum communication protocols against Trojan horse attackarXiv: Quantum Physics
Xiaojun Wen, X. Niu, Liping Ji, Yuan Tian (2009)
A weak blind signature scheme based on quantum cryptographyOptics Communications, 282
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
Yazhen Wang (2012)
Quantum Computation and Quantum InformationStatistical Science, 27
Vishnu Teja, Payel Banerjee, N. Sharma, R. Mittal (2007)
Quantum cryptography: State-of-art, challenges and future perspectives2007 7th IEEE Conference on Nanotechnology (IEEE NANO)
Zeng Gui-hua (2001)
Signature Scheme Based on Quantum Cryptography
Hoi-Kwong Lo, Yi Zhao (1995)
Quantum Cryptography
In this paper, we present a sessional blind signature protocol whose security is guaranteed by fundamental principles of quantum physics. It allows a message owner to get his message signed by an authorized signatory. However, the signatory is not capable of reading the message contents and everyone can verify authenticity of the message. For this purpose, we took advantage of a sessional signature as well as quantum entangled pairs which are generated with respect to it in our proposed protocol. We describe our proposed blind signature through an example and briefly discuss about its unconditional security. Due to the feasibility of the protocol, it can be widely employed for e-payment, e-government, e-business and etc.
Quantum Information Processing – Springer Journals
Published: Jan 26, 2013
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.