2015
DOI: 10.3390/e17085635
|View full text |Cite
|
Sign up to set email alerts
|

Unconditionally Secure Quantum Signatures

Abstract: Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols-sign… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
27
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 44 publications
(27 citation statements)
references
References 46 publications
0
27
0
Order By: Relevance
“…Currently used classical digital signature schemes, however, rely on unproven computational assumptions [2], and may become insecure especially if quantum computers can be built [3]. Quantum digital signatures (QDSs) [4][5][6][7][8][9][10], on the other hand, give information-theoretic security [7], loosely speaking based on the fact that nonorthogonal quantum states cannot be perfectly distinguished from each other.The first quantum signature schemes assumed tamperproof, "authenticated" quantum communication links. Intuitively, this could be accomplished using parameter estimation techniques similar to those used in quantum key distribution (QKD).…”
mentioning
confidence: 99%
“…Currently used classical digital signature schemes, however, rely on unproven computational assumptions [2], and may become insecure especially if quantum computers can be built [3]. Quantum digital signatures (QDSs) [4][5][6][7][8][9][10], on the other hand, give information-theoretic security [7], loosely speaking based on the fact that nonorthogonal quantum states cannot be perfectly distinguished from each other.The first quantum signature schemes assumed tamperproof, "authenticated" quantum communication links. Intuitively, this could be accomplished using parameter estimation techniques similar to those used in quantum key distribution (QKD).…”
mentioning
confidence: 99%
“…Eq. (10) implies that (ω + 1) log(|M|) is the bit-length of the signature. The authors also show that the HSZI scheme provides security proportional to 1/|M|.…”
Section: Classical Uss Schemesmentioning
confidence: 99%
“…Before we proceed, we first briefly survey the USS schemes which are already proposed in the literature. For a detailed overview, we refer the interested reader to [10] and the references therein.…”
Section: Introductionmentioning
confidence: 99%
“…Different from encryption, digital signatures play a vital role in software distribution, modern communication and financial transactions, where the integrity of the data against forgery is of utmost importance. While they are currently implemented using public-key cryptography, quantum digital signatures (QDS) have recently been introduced 16 – 18 to allow users to sign a document by quantum means and transfer it to other users with information-theoretical security. Quantum signatures were introduced in ref.…”
Section: Introductionmentioning
confidence: 99%