{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T01:36:53Z","timestamp":1722994613116},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2014,5,27]],"date-time":"2014-05-27T00:00:00Z","timestamp":1401148800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s11128-014-0760-8","type":"journal-article","created":{"date-parts":[[2014,5,26]],"date-time":"2014-05-26T05:48:51Z","timestamp":1401083331000},"page":"1677-1685","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Security of a sessional blind signature based on quantum cryptograph"],"prefix":"10.1007","volume":"13","author":[{"given":"Tian-Yin","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Qiu","family":"Cai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rui-Ling","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,5,27]]},"reference":[{"key":"760_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signature for untraceable payments. Advances in cryptology. In: Proceeding of Crypto82, pp. 199\u2013203. Springer, New York (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"760_CR2","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Elections with unconditionally-secret ballots and disruption equivelent to breaking RAS. Advances in cryptology. In: Proceedings of Euro-Crypto88, pp. 177\u2013189. Springer, Berlin (1988)","DOI":"10.1007\/3-540-45961-8_15"},{"key":"760_CR3","doi-asserted-by":"crossref","unstructured":"Brands, S.: Untraceble off-line cash in wallet with observers. Advances in cryptology. In: Proceeding of Crypto93, pp. 302\u2013318. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48329-2_26"},{"issue":"15","key":"760_CR4","first-page":"155","volume":"33","author":"TY Wang","year":"2007","unstructured":"Wang, T.Y., Cai, X.Q., Zhang, J.Z.: Off-line e-cash system with multiple banks based on elliptic curve. Comput. Eng. Appl. 33(15), 155\u2013157 (2007)","journal-title":"Comput. Eng. Appl."},{"issue":"1","key":"760_CR5","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1007\/s11128-012-0398-3","volume":"12","author":"XJ Wen","year":"2013","unstructured":"Wen, X.J., Chen, Y.Z., Fang, J.B.: An inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(1), 549\u2013558 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"760_CR6","doi-asserted-by":"crossref","first-page":"1651","DOI":"10.1007\/s11128-012-0477-5","volume":"12","author":"XQ Cai","year":"2013","unstructured":"Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651\u20131657 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"14","key":"760_CR7","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1049\/el:19950815","volume":"31","author":"L Harn","year":"1995","unstructured":"Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm. Electron. Lett. 31(14), 1136\u20131137 (1995)","journal-title":"Electron. Lett."},{"issue":"9","key":"760_CR8","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1049\/el:19960545","volume":"32","author":"C Fan","year":"1996","unstructured":"Fan, C., Lei, C.: Efficient blind signature scheme based on quadratic residues. Electron. Lett. 32(9), 811\u2013813 (1996)","journal-title":"Electron. Lett."},{"issue":"5","key":"760_CR9","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"issue":"19","key":"760_CR10","doi-asserted-by":"crossref","first-page":"4329","DOI":"10.1103\/PhysRevLett.80.4329","volume":"80","author":"LK Grover","year":"1998","unstructured":"Grover, L.K.: Quantum computers can search rapidly by using almost any transformation. Phys. Rev. Lett. 80(19), 4329\u20134332 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"760_CR11","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE Press (1984)"},{"issue":"21","key":"760_CR12","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"24","key":"760_CR13","doi-asserted-by":"crossref","first-page":"6130","DOI":"10.1016\/j.optcom.2008.09.026","volume":"281","author":"TY Wang","year":"2008","unstructured":"Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130\u20136134 (2008)","journal-title":"Opt. Commun."},{"issue":"1","key":"760_CR14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1016\/j.physleta.2008.11.004","volume":"373","author":"TY Wang","year":"2008","unstructured":"Wang, T.Y., Wen, Q.Y., Gao, F., et al.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373(1), 65\u201368 (2008)","journal-title":"Phys. Lett. A"},{"issue":"16","key":"760_CR15","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1016\/j.optcom.2009.05.036","volume":"282","author":"TY Wang","year":"2009","unstructured":"Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382\u20133385 (2009)","journal-title":"Opt. Commun."},{"issue":"24","key":"760_CR16","doi-asserted-by":"crossref","first-page":"245501","DOI":"10.1088\/0953-4075\/43\/24\/245501","volume":"43","author":"TY Wang","year":"2010","unstructured":"Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Economical quantum anonymous transmissions. J. Phys. B At. Mol. Opt. Phys. 43(24), 245501 (2010)","journal-title":"J. Phys. B At. Mol. Opt. Phys."},{"issue":"5","key":"760_CR17","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/JQE.2011.2107889","volume":"47","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F., et al.: Dense-coding attack on threeparty quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630\u2013635 (2011)","journal-title":"IEEE J. Quantum Electron."},{"issue":"5\u20136","key":"760_CR18","first-page":"0434","volume":"11","author":"TY Wang","year":"2011","unstructured":"Wang, T.Y., Wen, Q.Y.: Security of a kind of quantum secret sharing with single photons. Quant. Inf. Comput. 11(5\u20136), 0434\u20130443 (2011)","journal-title":"Quant. Inf. Comput."},{"issue":"4","key":"760_CR19","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Christoph, H.K.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5\u20136","key":"760_CR20","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., et al.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5\u20136), 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"760_CR21","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"760_CR22","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1140\/epjd\/e2010-10157-4","volume":"61","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Zhou, Z., Teng, Y.W., et al.: Arbitrated quantum signature with an untrusted arbitrator. Euro. Phys. J. D 61(3), 773\u2013778 (2011)","journal-title":"Euro. Phys. J. D"},{"issue":"5","key":"760_CR23","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1007\/s11128-010-0225-7","volume":"10","author":"JJ Shi","year":"2011","unstructured":"Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653\u2013670 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"760_CR24","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s11128-011-0258-6","volume":"11","author":"TY Wang","year":"2012","unstructured":"Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455\u2013463 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"760_CR25","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1007\/s11128-013-0524-x","volume":"12","author":"HJ Zuo","year":"2013","unstructured":"Zuo, H.J., Zhang, Kj, Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343\u20132353 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"760_CR26","doi-asserted-by":"crossref","first-page":"1991","DOI":"10.1007\/s11128-012-0508-2","volume":"12","author":"TY Wang","year":"2013","unstructured":"Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12(5), 1991\u20131997 (2013)","journal-title":"Quantum Inf. Process."},{"key":"760_CR27","doi-asserted-by":"crossref","unstructured":"Li, Y.B., Wen, Q.Y., Li, Z.C., et al.: Cheat sensitive quantum bit commitment via pre- and post-selected quantum states. Quantum Inf. Process. 13(1), 141\u2013149 (2014)","DOI":"10.1007\/s11128-013-0566-0"},{"issue":"5","key":"760_CR28","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1016\/j.optcom.2008.10.025","volume":"282","author":"XJ Wen","year":"2009","unstructured":"Wen, X.J., Niu, X.M., Jia, L.P., et al.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(5), 666\u2013669 (2009)","journal-title":"Opt. Commun."},{"issue":"6","key":"760_CR29","doi-asserted-by":"crossref","first-page":"060307","DOI":"10.1088\/1674-1056\/19\/6\/060307","volume":"19","author":"TY Wang","year":"2010","unstructured":"Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 060307 (2010)","journal-title":"Chin. Phys. B"},{"key":"760_CR30","doi-asserted-by":"crossref","first-page":"4408","DOI":"10.1016\/j.optcom.2010.06.061","volume":"283","author":"Q Su","year":"2010","unstructured":"Su, Q., Huang, Z., Wen, Q.Y., et al.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283, 4408\u20134410 (2010)","journal-title":"Opt. Commun."},{"issue":"21","key":"760_CR31","first-page":"5051","volume":"6","author":"M Naseri","year":"2011","unstructured":"Naseri, M.: Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci. 6(21), 5051\u20135053 (2011)","journal-title":"Int. J. Phys. Sci."},{"issue":"3","key":"760_CR32","doi-asserted-by":"crossref","first-page":"030306","DOI":"10.1088\/1674-1056\/21\/3\/030306","volume":"21","author":"LB He","year":"2012","unstructured":"He, L.B., Huang, L.S., Yang, W., et al.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 030306 (2012)","journal-title":"Chin. Phys. B"},{"issue":"30","key":"760_CR33","doi-asserted-by":"crossref","first-page":"1250163","DOI":"10.1142\/S0217979212501639","volume":"26","author":"XQ Cai","year":"2012","unstructured":"Cai, X.Q., Niu, H.F.: Partially blind signatures based on quantum cryptography. Int. J. Mod. Phys. B 26(30), 1250163 (2012)","journal-title":"Int. J. Mod. Phys. B"},{"issue":"6","key":"760_CR34","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1007\/s11128-012-0509-1","volume":"12","author":"XF Zou","year":"2013","unstructured":"Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12(6), 2071\u20132085 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"760_CR35","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s11128-013-0529-5","volume":"13","author":"K Siavash","year":"2014","unstructured":"Siavash, K., Ali, Z.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13(1), 121\u2013130 (2014)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0760-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0760-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0760-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T20:01:30Z","timestamp":1565467290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0760-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,27]]},"references-count":35,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["760"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0760-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,27]]}}}