Threshold proxy quantum signature scheme with threshold shared verification
From MaRDI portal
Publication:946395
DOI10.1007/S11433-008-0062-1zbMath1145.81348OpenAlexW2222591734MaRDI QIDQ946395
Publication date: 23 September 2008
Published in: Science in China. Series G (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11433-008-0062-1
Related Items (29)
A novel quantum blind signature scheme with four-particle GHZ states ⋮ A novel quantum blind signature scheme with four-particle cluster states ⋮ Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states ⋮ Security analysis of quantum multi-signature protocol based on teleportation ⋮ Analysis of counterfactual quantum certificate authorization ⋮ Reexamination of arbitrated quantum signature: the impossible and the possible ⋮ Improved quantum signature scheme with weak arbitrator ⋮ Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator ⋮ Cryptanalysis of the quantum group signature protocols ⋮ Quantum \((t, m, n)\) threshold group blind signature scheme with flexible number of participants ⋮ Semi-quantum ring signature protocol based on multi-particle GHZ state ⋮ Quantum \((t, n)\) threshold group signature based on Bell state ⋮ Analysis of efficient quantum multi-proxy signature ⋮ Security problems in the quantum signature scheme with a weak arbitrator ⋮ Cryptanalysis of a batch proxy quantum blind signature scheme ⋮ Improved group signature scheme based on quantum teleportation ⋮ A synchronous quantum blind signature scheme with entanglement swapping ⋮ \((t,n)\) threshold quantum secret sharing using the phase shift operation ⋮ A blind signature protocol with exchangeable signature sequence ⋮ A new quantum proxy signature model based on a series of genuine entangled states ⋮ Quantum proxy threshold multiple signature scheme ⋮ QUANTUM PROXY GROUP SIGNATURE SCHEME WITH χ-TYPE ENTANGLED STATES ⋮ Quantum homomorphic signature based on Bell-state measurement ⋮ A novel quantum group signature scheme without using entangled states ⋮ Security analysis of particular quantum proxy blind signature against the forgery attack ⋮ A novel quantum group proxy blind signature scheme based on five-qubit entangled state ⋮ Quantum blind signature scheme with cluster states based on quantum walk cryptosystem ⋮ Cryptanalysis of a quantum proxy weak blind signature scheme ⋮ Quantum signature scheme using a single qubit rotation operator
Cites Work
- Quantum cryptography: public key distribution and coin tossing
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Quantum secure direct communication based on order rearrangement of single photons
- Improving the security of multiparty quantum secret sharing against an attack with a fake signal
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Quantum cryptography without public announcement of bases
- Quantum secret sharing without entanglement
- Arbitrated quantum signature scheme with message recovery
- Multiparty secret sharing of quantum information based on entanglement swapping
- Improving Wójcik's eavesdropping attack on the ping-pong protocol
- Bidirectional quantum secret sharing and secret splitting with polarized single photons
- An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs
- How to share a secret
- Multiparty quantum secret sharing
- Secure communication with single-photon two-qubit states
- Quantum cryptography based on Bell’s theorem
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Quantum cryptography using any two nonorthogonal states
- Quantum secret sharing
- An Arbitrated Quantum Message Signature Scheme
This page was built for publication: Threshold proxy quantum signature scheme with threshold shared verification