2022
DOI: 10.1007/s11128-022-03786-1
|View full text |Cite
|
Sign up to set email alerts
|

An improved efficient identity-based quantum signature scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Eve acts as an overseer. Alice, Bob, Charlie, David, and Eve share the nine-qubit entangled channels given in Equation (3), where the qubits (1,2,3) of the channels belong to Alice and are marked with bits a 0 , a 1 , and a 2 respectively, and Eve owns qubits (4), marked with e. The qubits (5,6) are in David's hands, and they are labeled d 1 and d 2 ; the qubits (7) and (8,9) belong to Bob and Charlie, respectively, and are labeled b and c 1 and c 2 , respectively. We can also rewrite the channel given in Equation (3) as follows:…”
Section: Controlled Remote State Preparation and Quantum Teleportatio...mentioning
confidence: 99%
See 1 more Smart Citation
“…Eve acts as an overseer. Alice, Bob, Charlie, David, and Eve share the nine-qubit entangled channels given in Equation (3), where the qubits (1,2,3) of the channels belong to Alice and are marked with bits a 0 , a 1 , and a 2 respectively, and Eve owns qubits (4), marked with e. The qubits (5,6) are in David's hands, and they are labeled d 1 and d 2 ; the qubits (7) and (8,9) belong to Bob and Charlie, respectively, and are labeled b and c 1 and c 2 , respectively. We can also rewrite the channel given in Equation (3) as follows:…”
Section: Controlled Remote State Preparation and Quantum Teleportatio...mentioning
confidence: 99%
“…Quantum mechanics has brought new possibilities to the development of the IoT, and so far, various quantum communication and quantum computing technologies have emerged. These include quantum authentication technology [4][5][6], quantum neural networks [7,8], and quantum signature technology [9,10], which greatly enhance computational efficiency and security. Quantum authentication technology aims to verify quantum channels' security, ensuring communication integrity and confidentiality.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, some of the studies focus on other perspectives that affect digital signatures, such as the digital signature algorithm [29], the quantum signature method [30], digital signature standards [31], security [32], etc. For example, security is the most important issue for digital signatures.…”
Section: Related Researchmentioning
confidence: 99%
“…This method can also be used in other AQS schemes. In 2022, Huang et al [24] proposed an improved identity based public key quantum signature scheme. In this scheme, the signer uses her key and the verifier's secret parameter to generate a quantum signature, and the signer and verifier do not need to exchange keys before signing the message, making the scheme highly efficient.…”
Section: Introductionmentioning
confidence: 99%