arbitrated quantum signature
Recently Published Documents


TOTAL DOCUMENTS

70
(FIVE YEARS 11)

H-INDEX

18
(FIVE YEARS 3)

Entropy ◽  
2022 ◽  
Vol 24 (1) ◽  
pp. 111
Author(s):  
Dianjun Lu ◽  
Zhihui Li ◽  
Jing Yu ◽  
Zhaowei Han

In this paper, we present a verifiable arbitrated quantum signature scheme based on controlled quantum teleportation. The five-qubit entangled state functions as a quantum channel. The proposed scheme uses mutually unbiased bases particles as decoy particles and performs unitary operations on these decoy particles, applying the functional values of symmetric bivariate polynomial. As such, eavesdropping detection and identity authentication can both be executed. The security analysis shows that our scheme can neither be disavowed by the signatory nor denied by the verifier, and it cannot be forged by any malicious attacker.


2020 ◽  
Vol 53 (13) ◽  
pp. 135301 ◽  
Author(s):  
Yanyan Feng ◽  
Ronghua Shi ◽  
Jinjing Shi ◽  
Wei Zhao ◽  
Yuhu Lu ◽  
...  

2019 ◽  
Vol 34 (21) ◽  
pp. 1950166 ◽  
Author(s):  
Xiangjun Xin ◽  
Qianqian He ◽  
Zhuo Wang ◽  
Qinglan Yang ◽  
Fagen Li

In the most arbitrated quantum signatures (AQSs), the signers and verifiers need to perform the quantum key distribution protocols or some other protocols to share secret keys before signing a signature. In some schemes, the entangle states, which are not easily implemented, have to be prepared and distributed among the partners. Based on single photon and one-way functions, a new AQS scheme without entangled states is proposed. In our scheme, the signer generates a quantum signature on the classical message with his/her private key and the one-way function. The arbitrator communicates with the signer through a classical unencrypted channel. The signer and verifier need not perform the key distribution protocol before signing a message. On the other hand, without entangled states, our scheme can reduce the complexity of implementation. Then, our scheme is more efficient than the similar schemes. At the same time, our scheme is secure against forgery attack and disavowal attack.


Optik ◽  
2019 ◽  
Vol 189 ◽  
pp. 23-31 ◽  
Author(s):  
Xiangjun Xin ◽  
Qianqian He ◽  
Zhuo Wang ◽  
Qinglan Yang ◽  
Fagen Li

2019 ◽  
Vol 18 (5) ◽  
Author(s):  
Yanyan Feng ◽  
Ronghua Shi ◽  
Jinjing Shi ◽  
Jian Zhou ◽  
Ying Guo

2019 ◽  
Vol 1176 ◽  
pp. 062056
Author(s):  
Wenjing Li ◽  
Qinghai Ou ◽  
Hongfa Li ◽  
Qing Wu ◽  
Changgui Huang ◽  
...  

2019 ◽  
Vol 68 (12) ◽  
pp. 120302
Author(s):  
Yan-Yan Feng ◽  
Rong-Hua Shi ◽  
Jin-Jing Shi ◽  
Ying Guo

Sign in / Sign up

Export Citation Format

Share Document