One-time proxy signature based on quantum cryptography

Quantum Information Processing - Tập 11 Số 2 - Trang 455-463 - 2012
Tian-Yin Wang1, Zong-Li Wei1
1School of Mathematical Science, Luoyang Normal University, Luoyang, 471022, Henan, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Mambo M., Usuda K., Okamoto E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79(A(9)), 1338–1353 (1996)

Wang T.Y., Cai X.Q., Zhang J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)

Cao F., Cao Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)

Kim, H., Baek, J., Lee, B., et al.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Proceedings of SCIS’2001, pp. 845–850. Oiso, Japan (2001)

Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Proceedings of Asiacrypt 2003, pp. 507–522. Springer, Berlin (2003)

Mehta M., Harn L.: Efficient one-time proxy signatures. IEE Proc. Commun. 152(2), 129–133 (2005)

Bicakci K.: One-time proxy signatures revisited. Comput. Stand. Interfaces 29(4), 499–505 (2007)

Shor P.: Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)

Grover L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)

Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, London (1984)

Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

Wang T.Y., Wen Q.Y., Chen X.B. et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)

Wang T.Y., Wen Q.Y., Gao F. et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)

Wang T.Y., Wen Q.Y., Zhu F.C.: Economical quantum anonymous transmissions. J. Phys. B: At. Mol. Opt. Phys. 43(24), 245501 (2010)

Wang T.Y., Wen Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)

Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032

Zeng G.H., Christoph H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)

Lee H., Hong C., Kim H., Lim J. et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)

Li Q., Chan W.H., Long D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)

Wen X.J., Niu X.M., Jia L.P. et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)

Wang T.Y., Wen Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)

Yang Y.G., Zhou Z., Teng Y.W. et al.: Arbitrated quantum signature with an untrusted arbitrator. The Euro. Phys. J. D 61(3), 773–778 (2011)

Yang Y.G., Wen Q.Y., Zhu F.C.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17(2), 415–418 (2008)

Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quant. Inf. Proc. doi: 10.1007/s11128-010-0225-7

Damgård, I.: A design principle for hash functions. In: Proceedings of the Crypto’89, pp. 416–427. Springer, Berlin (1990)

Lidar D.A., Chang I.L., Whaley K.B.: Decoherence-free subspaces for quantum computation. Phys. Rev. Lett. 81(12), 2594–2597 (1998)

Walton Z.D., Abouraddy A.F., Sergienko A.V. et al.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91(8), 087901 (2003)

Boileau J.C, Laflamme R., Laforest M. et al.: Robust quantum communication using a polarization-entangled photon pair. Phys. Rev. Lett. 93(22), 220501 (2004)

Wang X.B.: Fault tolerant quantum key distribution protocol with collective random unitary noise. Phys. Rev. A 72(5), 050304 (2005)

Li X.H., Deng F.G., Zhou H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)

Cabello A.: Six-qubit permutation-based decoherence-free orthogonal basis. Phys. Rev. A 75(2), 020301 (2007)

Sun Y., Wen Q.Y., Gao F. et al.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)

Qin S.J., Wen Q.Y., Meng L.M. et al.: Quantum secure direct communication over the collective amplitude damping channel. Sci. China. Ser. G 52(8), 1208–1212 (2009)

Wang T.Y., Wen Q.Y., Zhu F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)

Majgier K., Maassen H., Zyczkowski K.: Protected subspaces in quantum information. Quant. Inf. Proc. 9(3), 343–367 (2010)