Access the full text.
Sign up today, get DeepDyve free for 14 days.
Hua-Lei Yin, Yao Fu, Zeng-Bing Chen (2015)
Practical quantum digital signaturePhysical Review A, 93
Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, H. Imai (2000)
Unconditionally Secure Digital Signature Schemes Admitting Transferability
V. Scarani, A. Acín, G. Ribordy, N. Gisin (2002)
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.Physical review letters, 92 5
RL Rivest, A Shamir, L Adleman (1978)
A method for obtaining digital signatures and public-key cryptosystemsCommun. ACM, 21
V. Scarani, H. Bechmann-Pasquinucci, N. Cerf, M. Dušek, N. Lutkenhaus, M. Peev (2008)
The security of practical quantum key distributionReviews of Modern Physics, 81
R. Amiri, E. Andersson (2015)
Unconditionally Secure Quantum SignaturesEntropy, 17
R. Amiri, P. Wallden, A. Kent, E. Andersson (2015)
Secure quantum signatures using insecure quantum channelsPhysical Review A, 93
R. Donaldson, R. Collins, Klaudia Kleczkowska, R. Amiri, P. Wallden, V. Dunjko, J. Jeffers, E. Andersson, G. Buller (2015)
Experimental demonstration of kilometer-range quantum digital signaturesPhysical Review A, 93
P. Wallden, V. Dunjko, A. Kent, E. Andersson (2014)
Quantum digital signatures with quantum-key-distribution componentsPhysical Review A, 91
P. Shiu (2007)
Cryptography: Theory and practice (3rd edn), by Douglas R. Stinson. Pp. 593. 2006. (hbk) £39.99. ISBN 1 58488 508 4 (Chapman and Hall / CRC).The Mathematical Gazette, 91
Qing Chen, Jian-Bo Cheng, Ke-lin Wang, Jiangfeng Du (2005)
Efficient construction of two-dimensional cluster states with probabilistic quantum gatesPhysical Review A, 73
V. Dunjko, P. Wallden, E. Andersson (2013)
Quantum digital signatures without quantum memory.Physical review letters, 112 4
J. Arrazola, P. Wallden, E. Andersson (2015)
Multiparty quantum signature schemesArXiv, abs/1505.07509
K. Fujii, Katsuji Yamamoto (2010)
Topological one-way quantum computation on verified logical cluster statesPhysical Review A, 82
Douglas Stinson (1995)
Cryptography: Theory and Practice
B. Korzh, C. Lim, Raphael Houlmann, N. Gisin, M. Li, D. Nolan, B. Sanguinetti, R. Thew, H. Zbinden (2014)
Provably secure and practical quantum key distribution over 307 km of optical fibreNature Photonics, 9
(1979)
Technical Report CSL-98
Lov Grover (1996)
A fast quantum mechanical algorithm for database search
J. You, Xiang-Bin Wang, T. Tanamoto, F. Nori (2006)
Efficient one-step generation of large cluster states with solid-state circuitsPhysical Review A, 75
Jung-Lun Hsu, Song-Kong Chong, T. Hwang, Chia-Wei Tsai (2013)
Dynamic quantum secret sharingQuantum Information Processing, 12
P. Clarke, R. Collins, V. Dunjko, E. Andersson, John Jeffers, Gerald Buller (2012)
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of lightNature Communications, 3
M. Tomamichel, C. Lim, N. Gisin, R. Renner (2011)
Tight finite-key analysis for quantum cryptographyNature Communications, 3
P. Shor (1994)
Algorithms for quantum computation: discrete logarithms and factoringProceedings 35th Annual Symposium on Foundations of Computer Science
H-Y Jia, Q-Y Wen, F Gao, S-J Qin, F-Z Guo (2012)
Dynamic quantum secret sharingPhys. Lett. A, 376
H. Lo, M. Curty, K. Tamaki (2014)
Secure quantum key distributionNature Photonics, 8
H. Chernoff (1952)
A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of ObservationsAnnals of Mathematical Statistics, 23
V Scarani, H Bechmann-Pasquinucci, NJ Cerf, M Šek, N Lütkenhaus, M Peev (2009)
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementationsRev. Mod. Phys., 81
K. Fujii, Y. Tokunaga (2010)
Fault-tolerant topological one-way quantum computation with probabilistic two-qubit gates.Physical review letters, 105 25
R. Collins, R. Donaldson, V. Dunjko, P. Wallden, P. Clarke, E. Andersson, John Jeffers, Gerald Buller (2013)
Realization of quantum digital signatures without the requirement of quantum memory.Physical review letters, 113 4
C. Swanson, Douglas Stinson (2011)
Unconditionally secure signature schemes revisitedJournal of Mathematical Cryptology, 10
A. Chefles (2001)
Unambiguous discrimination between linearly dependent states with multiple copiesPhysical Review A, 64
D. Chaum, Sandra Roijakkers (1990)
Unconditionally Secure Digital Signatures
X. Zou, W. Mathis (2005)
Schemes for generating the cluster states in microwave cavity QED (6 pages)Physical Review A, 72
D. Johnson, A. Menezes, S. Vanstone (2001)
The Elliptic Curve Digital Signature Algorithm (ECDSA)International Journal of Information Security, 1
Taher Gamal (1984)
A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Trans. Inf. Theory, 31
Chaoyang Lu, Xiaoqi Zhou, O. Guhne, Wei-bo Gao, Jin Zhang, Zhen-Sheng Yuan, A. Goebel, Tao Yang, Jian-Wei Pan (2006)
Experimental entanglement of six photons in graph statesNature Physics, 3
E. Andersson, M. Curty, I. Jex (2006)
Experimentally realizable quantum comparison of coherent states and its applicationsPhysical Review A, 74
Haidê Cristina, Dutra Souza, Laís Vitória, S. Souza, L. Pereira, L. Bernardino (2018)
ProtectionEncyclopedia of the UN Sustainable Development Goals
Chen et al. (Phys Rev A 73:012303, 2006) constructed this “starlike cluster” state, which involves one qubit located at the center and n neighboring two-qubit arms. This genuine entangled state has been used for the construction of 2D and 3D cluster states, topological one-way computation, and dynamical quantum secret sharing. In this paper, we investigate the usefulness of this starlike cluster state and propose a theoretically extensible quantum digital signature scheme. The proposed scheme can be theoretically generalized to more than three participants. Moreover, it retains the merits of no requirements such as authenticated quantum channels and long-term quantum memory. We also give a security proof for the proposed scheme against repudiation and forgery.
Quantum Information Processing – Springer Journals
Published: Dec 10, 2016
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.