One-time proxy signature based on quantum cryptography
Tóm tắt
Từ khóa
Tài liệu tham khảo
Mambo M., Usuda K., Okamoto E.: Proxy signature: delegation of the power to sign messages. IEICE Trans. Fundam. E79(A(9)), 1338–1353 (1996)
Wang T.Y., Cai X.Q., Zhang J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155–157 (2007)
Cao F., Cao Z.F.: A secure identity-based proxy multi-signature scheme. Inf. Sci. 179(3), 292–302 (2009)
Kim, H., Baek, J., Lee, B., et al.: Secret computation with secrets for mobile agent using one-time proxy signature. In: Proceedings of SCIS’2001, pp. 845–850. Oiso, Japan (2001)
Wang, H., Pieprzyk, J.: Efficient one-time proxy signatures. In: Proceedings of Asiacrypt 2003, pp. 507–522. Springer, Berlin (2003)
Shor P.: Polynomial-time algorithms for prime factorization and discrete logrithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997)
Grover L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329–4332 (1998)
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, London (1984)
Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
Wang T.Y., Wen Q.Y., Chen X.B. et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130–6134 (2008)
Wang T.Y., Wen Q.Y., Gao F. et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65–68 (2008)
Wang T.Y., Wen Q.Y., Zhu F.C.: Economical quantum anonymous transmissions. J. Phys. B: At. Mol. Opt. Phys. 43(24), 245501 (2010)
Wang T.Y., Wen Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5–6), 0434–0443 (2011)
Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph/0105032
Lee H., Hong C., Kim H., Lim J. et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5–6), 295–300 (2004)
Li Q., Chan W.H., Long D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)
Wen X.J., Niu X.M., Jia L.P. et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666–669 (2009)
Yang Y.G., Zhou Z., Teng Y.W. et al.: Arbitrated quantum signature with an untrusted arbitrator. The Euro. Phys. J. D 61(3), 773–778 (2011)
Yang Y.G., Wen Q.Y., Zhu F.C.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17(2), 415–418 (2008)
Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quant. Inf. Proc. doi: 10.1007/s11128-010-0225-7
Damgård, I.: A design principle for hash functions. In: Proceedings of the Crypto’89, pp. 416–427. Springer, Berlin (1990)
Lidar D.A., Chang I.L., Whaley K.B.: Decoherence-free subspaces for quantum computation. Phys. Rev. Lett. 81(12), 2594–2597 (1998)
Walton Z.D., Abouraddy A.F., Sergienko A.V. et al.: Decoherence-free subspaces in quantum key distribution. Phys. Rev. Lett. 91(8), 087901 (2003)
Boileau J.C, Laflamme R., Laforest M. et al.: Robust quantum communication using a polarization-entangled photon pair. Phys. Rev. Lett. 93(22), 220501 (2004)
Wang X.B.: Fault tolerant quantum key distribution protocol with collective random unitary noise. Phys. Rev. A 72(5), 050304 (2005)
Li X.H., Deng F.G., Zhou H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)
Cabello A.: Six-qubit permutation-based decoherence-free orthogonal basis. Phys. Rev. A 75(2), 020301 (2007)
Sun Y., Wen Q.Y., Gao F. et al.: Robust variations of the Bennett-Brassard 1984 protocol against collective noise. Phys. Rev. A 80(3), 032321 (2009)
Qin S.J., Wen Q.Y., Meng L.M. et al.: Quantum secure direct communication over the collective amplitude damping channel. Sci. China. Ser. G 52(8), 1208–1212 (2009)
Wang T.Y., Wen Q.Y., Zhu F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382–3385 (2009)