{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T22:17:45Z","timestamp":1722982665245},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,8,24]],"date-time":"2013-08-24T00:00:00Z","timestamp":1377302400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11128-013-0634-5","type":"journal-article","created":{"date-parts":[[2013,8,23]],"date-time":"2013-08-23T13:28:04Z","timestamp":1377264484000},"page":"113-120","source":"Crossref","is-referenced-by-count":13,"title":["Arbitrated quantum signature of classical messages without using authenticated classical channels"],"prefix":"10.1007","volume":"13","author":[{"given":"Yi-Ping","family":"Luo","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,24]]},"reference":[{"issue":"4","key":"634_CR1","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"634_CR2","doi-asserted-by":"crossref","first-page":"046301","DOI":"10.1103\/PhysRevA.77.046301","volume":"77","author":"M Curty","year":"2008","unstructured":"Curty, M., L\u00fctkenhaus, N.: Comment on \u201carbitrated quantum-signature scheme\u201d. Phys. Rev. A 77(4), 046301 (2008)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"634_CR3","doi-asserted-by":"crossref","first-page":"016301","DOI":"10.1103\/PhysRevA.78.016301","volume":"78","author":"GH Zeng","year":"2008","unstructured":"Zeng, G.H.: Reply to \u201ccomment on \u2018arbitrated quantum-signature scheme\u201d\u2019. Phys. Rev. A 78(1), 016301 (2008)","journal-title":"Phys. Rev. A"},{"key":"634_CR4","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures, arXiv:quant-ph\/0105032v2 (2001)"},{"key":"634_CR5","doi-asserted-by":"crossref","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going beyond bell\u2019s theorem. In: Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe, pp. 69\u201372 (1989)","DOI":"10.1007\/978-94-017-0849-4_10"},{"key":"634_CR6","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"key":"634_CR7","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.physleta.2005.09.034","volume":"347","author":"J Wang","year":"2005","unstructured":"Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: \u201carbitrated quantum signature scheme with message recovery\u201d. Phys. Lett. A 347, 262\u2013263 (2005)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"634_CR8","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"634_CR9","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"634_CR10","doi-asserted-by":"crossref","first-page":"056301","DOI":"10.1103\/PhysRevA.85.056301","volume":"85","author":"T Hwang","year":"2012","unstructured":"Hwang, T., Luo, Y.-P., Chong, S.-K.: Comment on \u201csecurity analysis and improvements of arbitrated quantum signature schemes\u201d. Phys. Rev. A 85, 056301 (2012)","journal-title":"Phys. Rev. A"},{"issue":"16","key":"634_CR11","doi-asserted-by":"crossref","first-page":"3198","DOI":"10.1016\/j.optcom.2010.04.020","volume":"283","author":"YG Yang","year":"2010","unstructured":"Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198\u20133201 (2010)","journal-title":"Opt. Commun."},{"issue":"19","key":"634_CR12","doi-asserted-by":"crossref","first-page":"3830","DOI":"10.1016\/j.optcom.2010.05.033","volume":"283","author":"YG Yang","year":"2010","unstructured":"Yang, Y.G., Wen, Q.Y.: Erratum: arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(19), 3830 (2010)","journal-title":"Opt. Commun."},{"issue":"3","key":"634_CR13","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/j.optcom.2010.09.080","volume":"284","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Luo, Y.P., Hwang, T.: On \u201carbitrated quantum signature of classical messages against collective amplitude damping noise\u201d. Opt. Commun. 284(3), 893\u2013895 (2011)","journal-title":"Opt. Commun."},{"issue":"12","key":"634_CR14","doi-asserted-by":"crossref","first-page":"3144","DOI":"10.1016\/j.optcom.2011.01.025","volume":"284","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Chong, S.K., Luo, Y.P., Wei, T.X.: New arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(12), 3144\u20133148 (2011)","journal-title":"Opt. Commun."},{"key":"634_CR15","volume-title":"Cryptography and Network Security, Principles and Practice","author":"W Stallings","year":"2003","unstructured":"Stallings, W.: Cryptography and Network Security, Principles and Practice. Prentice Hall, Englewood Cliffs, NJ (2003)"},{"issue":"6","key":"634_CR16","doi-asserted-by":"crossref","first-page":"062330","DOI":"10.1103\/PhysRevA.84.062330","volume":"84","author":"J Choi","year":"2011","unstructured":"Choi, J., Chang, K.-Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84(6), 062330 (2011)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"634_CR17","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(6), 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"634_CR18","doi-asserted-by":"crossref","unstructured":"Damgard, I.: A design principle for hash functions. In: Advances in Cryptology: Proceedings of CRYPTO\u201989, Santa Barbara, California, USA, pp. 416\u2013427 (1989)","DOI":"10.1007\/0-387-34805-0_39"},{"key":"634_CR19","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"634_CR20","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack, e-print quant-ph\/0508168 (2005)"},{"key":"634_CR21","first-page":"41","volume":"5","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ko, T.-M.: Some attacks on quantum-based cryptographic protocols. Quantum Inf. Comput. 5, 41\u201348 (2005)","journal-title":"Quantum Inf. Comput."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0634-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0634-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0634-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,21]],"date-time":"2019-07-21T19:57:39Z","timestamp":1563739059000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0634-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,24]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["634"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0634-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,24]]}}}