2019
DOI: 10.1007/s11128-019-2365-8
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of multiparty quantum digital signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 27 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Here, we analyze the outside (i.e., outside eavesdropper wants to steal the private information of all players) and participant (i.e., attack from one or more dishonest players) attacks. We discuss four types of outside attacks (i.e., Intercept-Resend (IR), Intercept, Entangle-Measure (EM ) and Forgery) and two types of participant attacks (i.e., Collision and Collusion) [3,66,70,69,67,68] .…”
Section: Security Analysismentioning
confidence: 99%
“…In addition, all these schemes can sign only a one-bit message in each round. If one wants to sign a multi-bit message using single-bit QDS schemes, he needs to encode it into a new message string and sign the new string bit by bit [22,[37][38][39][40][41]. However, these solutions have not been completely proved as information-theoretically secure with the quantified failure probability, and the signature rate is very low and far from implementation for long messages with a lot of bits.…”
Section: Introductionmentioning
confidence: 99%