Experimental quantum e-commerce

XY Cao, BH Li, Y Wang, Y Fu, HL Yin, ZB Chen - Science Advances, 2024 - science.org
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …

Experimental quantum secure network with digital signatures and encryption

HL Yin, Y Fu, CL Li, CX Weng, BH Li, J Gu… - National Science …, 2023 - academic.oup.com
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …

One-time universal hashing quantum digital signatures without perfect keys

BH Li, YM **e, XY Cao, CL Li, Y Fu, HL Yin… - Physical Review Applied, 2023 - APS
Quantum digital signatures (QDSs), generating correlated bit strings among three remote
parties for signatures through quantum law, can guarantee nonrepudiation, authenticity, and …

Beating the fault-tolerance bound and security loopholes for byzantine agreement with a quantum solution

CX Weng, RQ Gao, Y Bao, BH Li, WB Liu, YM **e… - Research, 2023 - spj.science.org
Byzantine agreement, the underlying core of blockchain, aims to make every node in a
decentralized network reach consensus. Classical Byzantine agreements unavoidably face …

Continuous-variable quantum digital signatures that can withstand coherent attacks

YF Zhang, WB Liu, BH Li, HL Yin, ZB Chen - Physical Review A, 2024 - APS
Quantum digital signatures (QDSs), which utilize correlated bit strings among sender and
recipients, guarantee the authenticity, integrity, and nonrepudiation of classical messages …

Asynchronous measurement-device-independent quantum digital signatures

JW Bian, BH Li, YM **e, HL Yin, ZB Chen - Physical Review A, 2024 - APS
Quantum digital signatures (QDSs), which distribute and measure quantum states by key
generation protocols and then sign messages via classical data processing, are a key area …

Quantum asymmetric key crypto scheme using Grover iteration

CS Yoon, CH Hong, MS Kang, JW Choi, HJ Yang - Scientific Reports, 2023 - nature.com
Here, we propose a quantum asymmetric key cryptography scheme using Grover's quantum
search algorithm. In the proposed scheme, Alice generates a pair of public and private keys …

Cryptanalysis and improvement of a (tn) threshold group signature scheme

R Guo, X Cheng - Quantum Information Processing, 2022 - Springer
Abstract Recently, a (t, n) threshold group signature scheme is present in Qin et al.(Quantum
Inf Process 19 (2): 71, 2020). In this paper, we point out that it is not a threshold signature …

Improved quantum (t, n) threshold group signature

Y Zhang, F Liu, H Zuo - Chinese Physics B, 2023 - iopscience.iop.org
Threshold signature is an important branch of the digital signature scheme, which can
distribute signature rights and avoid the abuse of signature rights. With the continuous …

Experimental demonstration of complete quantum e-commerce based on an efficient quantum digital payment

S Liu, Y Zhang, S Ren, S Qiu, Z Lu, X Wang… - Photonics Research, 2025 - opg.optica.org
With the rapid spread of Internet technology, e-commerce is gradually becoming an integral
part of the modern business models. The e-commerce transactions should obey integrity …