2017
DOI: 10.1007/s11128-017-1531-0
|View full text |Cite
|
Sign up to set email alerts
|

An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(10 citation statements)
references
References 48 publications
0
9
0
1
Order By: Relevance
“…Here we present an instance for showing the application of arbitrated signature for a secure payment in our real life. This example can also be found in [15] and this kind of applications has been mentioned in many AQS schemes [15,22,23,26,54]. We denote Alice, Bob and banker as buyer, seller and arbitrator, respectively.…”
Section: Further Discussionmentioning
confidence: 91%
See 1 more Smart Citation
“…Here we present an instance for showing the application of arbitrated signature for a secure payment in our real life. This example can also be found in [15] and this kind of applications has been mentioned in many AQS schemes [15,22,23,26,54]. We denote Alice, Bob and banker as buyer, seller and arbitrator, respectively.…”
Section: Further Discussionmentioning
confidence: 91%
“…In view of this, in 2015 Li and Shi [22] substituted the chained CNOT operations encryption for the QOTP encryption and suggested the corresponding AQS protocol, in which the encrypted qubits are related to the associated message qubit and key bit and the (other) positions of the message and the key. In 2017, Zhang et al [23] put forward an AQS algorithm with the key-controlled chained CNOT (KCCC) operations derived from the chained CNOT operations, which can deter against the participants' forgery and disavowal attacks. In 2019, Chen et al [24] discovered a kind of C-SWAP attack in QOTP-based AQS schemes and brought forward an AQS scheme using the improved QOTP by adding an extra diffusion step to change the encryption manner of qubit by qubit.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the efficiency of quantum bit to 100%, Yang [ 21 ] proposed an AQS scheme with the cluster state in 2016. In 2017, in order to resist forgery attacks and disavowal attacks, Zhang et al [ 22 ] proposed a new quantum encryption based on the key-controlled chained CNOT operations (KCCC encryption), and through KCCC encryption, constructed an improved arbitrated quantum signature protocol. In 2016, Yang et al [ 23 ] also proposed a theoretically extensible quantum digital signature with a star-like cluster state.…”
Section: Introductionmentioning
confidence: 99%
“…In 2002, Zeng and Keitel [ 12 ] proposed the first arbitrated quantum signature protocol based on the Green–Horne–Zeilinger (GHZ) state. Since then, various quantum signature protocols have been proposed, for example, arbitrated quantum signature [ 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 ], quantum blind signature [ 21 , 22 , 23 , 24 , 25 , 26 ], quantum proxy signature [ 27 , 28 ], and quantum group signature [ 29 ]. Inspired by the above quantum signature schemes [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 ], Zhao et al [ 30 ] proposed a signature scheme based on the concept of “bi-signature.” In Zhao et al’s quantum bi-signature protocol, two participants sign their signatures on the same message.…”
Section: Introductionmentioning
confidence: 99%
“…The aforementioned quantum signature schemes [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 ] all require the assumption that all participants in the protocol are quantum-capable, i.e., they must have devices such as photonic generators, quantum memory, and photonic measurement devices. In the absence of these devices, quantum signature protocols [ 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 , 28 , 29 , 30 ] cannot be executed. However, quantum devices are not widely available, and not all participants have access to such devices.…”
Section: Introductionmentioning
confidence: 99%