{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T15:19:25Z","timestamp":1718896765175},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T00:00:00Z","timestamp":1353542400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1007\/s11128-012-0509-1","type":"journal-article","created":{"date-parts":[[2012,11,22]],"date-time":"2012-11-22T17:17:13Z","timestamp":1353604633000},"page":"2071-2085","source":"Crossref","is-referenced-by-count":21,"title":["Attack and improvements of fair quantum blind signature schemes"],"prefix":"10.1007","volume":"12","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,11,22]]},"reference":[{"key":"509_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"issue":"6","key":"509_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"509_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"5410","key":"509_CR4","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"2","key":"509_CR5","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"509_CR6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48(3), 351\u2013406 (2001)","journal-title":"J. ACM (JACM)"},{"issue":"1","key":"509_CR7","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"3","key":"509_CR8","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1140\/epjd\/e2007-00010-4","volume":"41","author":"H Inamori","year":"2007","unstructured":"Inamori, H., L\u00fctkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599\u2013627 (2007)","journal-title":"Eur. Phys. J. D"},{"key":"509_CR9","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"509_CR10","unstructured":"Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York (1996)"},{"key":"509_CR11","unstructured":"Gottesman, D., Chuang, I.: Quantum Digital Signatures. ArXiv:quant-ph\/0105032 (2001)"},{"key":"509_CR12","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 449\u2013458 (2002)"},{"issue":"2","key":"509_CR13","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.66.022301","volume":"66","author":"M Curty","year":"2002","unstructured":"Curty, M., Santos, D.J., P\u00e9rez, E., Garc\u00eda-Fern\u00e1ndez, P.: Qubit authentication. Phys. Rev. A 66(2), 022301 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"509_CR14","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"509_CR15","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"509_CR16","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"509_CR17","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"key":"509_CR18","doi-asserted-by":"crossref","unstructured":"L\u00fc, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Computational and Information Science 2004 (CIS 2004), LNCS, vol. 3314, pp. 1054\u20131060. Springer (2004)","DOI":"10.1007\/978-3-540-30497-5_162"},{"key":"509_CR19","unstructured":"Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with message recovery. In: IEEE 8th International Conference on Advanced Communication Technology, 2006 (ICACT 2006), vol. 2, pp. 1375\u20131378. (2006)"},{"issue":"3\/4","key":"509_CR20","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1515\/zna-2007-3-405","volume":"62","author":"X Wen","year":"2007","unstructured":"Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62(3\/4), 147 (2007)","journal-title":"Z. Naturforsch. A"},{"issue":"4","key":"509_CR21","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1142\/S0219749907003031","volume":"5","author":"G Zeng","year":"2007","unstructured":"Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quant. Inf. 5(4), 553\u2013573 (2007)","journal-title":"Int. J. Quant. Inf."},{"key":"509_CR22","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1088\/1674-1056\/17\/2\/011","volume":"17","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)","journal-title":"Chin. Phys. B"},{"key":"509_CR23","unstructured":"Lu, X., Feng, D.: Quantum digital signature based on quantum one-way functions. In: The 7th International Conference on Advanced Communication Technology, 2005 (ICACT 2005), IEEE, vol. 1, pp. 514\u2013517. (2004)"},{"key":"509_CR24","unstructured":"Cao, Z., Markowitch, O.: Security analysis of one quantum digital signature scheme. In: The Sixth International Conference on Information Technology: New Generations, 2009 (ITNG\u201909), IEEE, pp. 1574\u20131576. (2009)"},{"issue":"4","key":"509_CR25","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1016\/j.optcom.2008.10.025","volume":"282","author":"X Wen","year":"2009","unstructured":"Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666\u2013669 (2009)","journal-title":"Opt. Commun."},{"issue":"6","key":"509_CR26","doi-asserted-by":"crossref","first-page":"060307","DOI":"10.1088\/1674-1056\/19\/6\/060307","volume":"19","author":"TY Wang","year":"2010","unstructured":"Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phy. B 19(6), 060307 (2010)","journal-title":"Chin. Phy. B"},{"issue":"4","key":"509_CR27","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"509_CR28","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"509_CR29","first-page":"41","volume":"5","author":"H Lo","year":"2005","unstructured":"Lo, H., Ko, T.: Some attacks on quantum-based cryptographic protocols. Quant. Inf. Comput. 5(1), 41\u201348 (2005)","journal-title":"Quant. Inf. Comput."},{"key":"509_CR30","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto. vol. 82, pp. 199\u2013203 (1982)"},{"key":"509_CR31","doi-asserted-by":"crossref","unstructured":"Stadler, M., Piveteau, J., Camenisch, J.: Fair blind signatures. In: Advances in Cryptology-Eurocrypt\u201995, pp. 209\u2013219. Springer (1995)","DOI":"10.1007\/3-540-49264-X_17"},{"key":"509_CR32","volume-title":"Linear Algebra and Its Applications","author":"G Strang","year":"2005","unstructured":"Strang, G.: Linear Algebra and Its Applications, 4th edn. Brooks\/Cole, Florence (2005)","edition":"4"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0509-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-012-0509-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0509-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,31]],"date-time":"2022-01-31T22:55:13Z","timestamp":1643669713000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-012-0509-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11,22]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,6]]}},"alternative-id":["509"],"URL":"https:\/\/doi.org\/10.1007\/s11128-012-0509-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11,22]]}}}