Arbitrated quantum signature scheme using Bell states

Q Li, WH Chan, DY Long - Physical Review A—Atomic, Molecular, and Optical …, 2009 - APS
In an arbitrated quantum signature scheme, the signatory signs the message and the
receiver verifies the signature's validity with the assistance of the arbitrator. We present an …

Cryptanalysis of the arbitrated quantum signature protocols

F Gao, SJ Qin, FZ Guo, QY Wen - Physical Review A—Atomic, Molecular, and …, 2011 - APS
As a new model for signing quantum messages, arbitrated quantum signature (AQS) has
recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS …

Designing high-performance identity-based quantum signature protocol with strong security

S Prajapat, P Kumar, S Kumar, AK Das, S Shetty… - IEEE …, 2024 - ieeexplore.ieee.org
Due to the rapid advancement of quantum computers, there has been a furious race for
quantum technologies in academia and industry. Quantum cryptography is an important tool …

Security analysis and improvements of arbitrated quantum signature schemes

X Zou, D Qiu - Physical Review A—Atomic, Molecular, and Optical …, 2010 - APS
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital
message or document. For signing quantum messages, some arbitrated quantum signature …

Survey on quantum information security

H Zhang, Z Ji, H Wang, W Wu - China Communications, 2019 - ieeexplore.ieee.org
The security of classical cryptography based on computational complexity assumptions has
been severely challenged with the rapid development of quantum computers and quantum …

Arbitrated quantum signature scheme with message recovery

H Lee, C Hong, H Kim, J Lim, HJ Yang - Physics Letters A, 2004 - Elsevier
Arbitrated quantum signature scheme with message recovery - ScienceDirect Skip to main
contentSkip to article Elsevier logo Journals & Books Help Search My account Sign in View …

Security of electronic payment systems: A comprehensive survey

S Solat - arxiv preprint arxiv:1701.04556, 2017 - arxiv.org
This comprehensive survey deliberated over the security of electronic payment systems. In
our research, we focused on either dominant systems or new attempts and innovations to …

Quantum cryptography for the future internet and the security analysis

T Zhou, J Shen, X Li, C Wang… - Security and …, 2018 - Wiley Online Library
Cyberspace has become the most popular carrier of information exchange in every corner of
our life, which is beneficial for our life in almost all aspects. With the continuous development …

Novel multiparty quantum key agreement protocol with GHZ states

GB Xu, QY Wen, F Gao, SJ Qin - Quantum information processing, 2014 - Springer
In many circumstances, a shared key is needed to realize secure communication. Based on
quantum mechanics principles, quantum key agreement (QKA) is a good method to …

Field experiment on a robust hierarchical metropolitan quantum cryptography network

FX Xu, W Chen, S Wang, ZQ Yin, Y Zhang, Y Liu… - Chinese Science …, 2009 - Springer
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial
telecom fiber cables is reported in this paper. The seven-user network contains a four-node …