{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:18:45Z","timestamp":1774937925496,"version":"3.50.1"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,7,20]],"date-time":"2014-07-20T00:00:00Z","timestamp":1405814400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11128-014-0795-x","type":"journal-article","created":{"date-parts":[[2014,7,19]],"date-time":"2014-07-19T06:21:41Z","timestamp":1405750901000},"page":"2007-2016","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Forgery attack on one-time proxy signature and the improvement"],"prefix":"10.1007","volume":"13","author":[{"given":"Chun-Wei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yi-Ping","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,7,20]]},"reference":[{"issue":"4","key":"795_CR1","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"795_CR2","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph\/0105032v2 , 15 November 2001"},{"issue":"12","key":"795_CR3","doi-asserted-by":"crossref","first-page":"3144","DOI":"10.1016\/j.optcom.2011.01.025","volume":"284","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Chong, S.K., Luo, Y.P., Wei, T.X.: New arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(12), 3144\u20133148 (2011)","journal-title":"Opt. Commun."},{"key":"795_CR4","doi-asserted-by":"crossref","unstructured":"Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on \u201cquantum blind signature based on two-state vector formalism. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-012-0362-2","DOI":"10.1007\/s11128-012-0362-2"},{"issue":"16","key":"795_CR5","doi-asserted-by":"crossref","first-page":"3198","DOI":"10.1016\/j.optcom.2010.04.020","volume":"283","author":"YG Yang","year":"2010","unstructured":"Yang, Y.G., Wen, Q.Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198\u20133201 (2010)","journal-title":"Opt. Commun."},{"issue":"1","key":"795_CR6","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1088\/0253-6102\/54\/1\/16","volume":"54","author":"Y-G Yang","year":"2010","unstructured":"Yang, Y.-G., Wang, Y., Teng, Y.-W., Chai, H.-P., Wen, Q.-Y.: Scalable arbitrated quantum signature of classical messages with multi-signers. Commun. Theor. Phys. 54(1), 84\u201388 (2010)","journal-title":"Commun. Theor. Phys."},{"issue":"6","key":"795_CR7","doi-asserted-by":"crossref","first-page":"60307","DOI":"10.1088\/1674-1056\/19\/6\/060307","volume":"19","author":"T-Y Wang","year":"2010","unstructured":"Wang, T.-Y., Wen, Q.-Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 60307\u2013060307 (2010)","journal-title":"Chin. Phys. B"},{"issue":"21","key":"795_CR8","doi-asserted-by":"crossref","first-page":"4408","DOI":"10.1016\/j.optcom.2010.06.061","volume":"283","author":"Q Su","year":"2010","unstructured":"Su, Q., Huang, Z., Wen, Q., Li, W.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408\u20134410 (2010)","journal-title":"Opt. Commun."},{"issue":"2","key":"795_CR9","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1007\/s11128-011-0258-6","volume":"11","author":"T-Y Wang","year":"2012","unstructured":"Wang, T.-Y., Wei, Z.-L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455\u2013463 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"795_CR10","doi-asserted-by":"crossref","first-page":"1828","DOI":"10.1007\/s11433-011-4457-z","volume":"54","author":"J Zhou","year":"2011","unstructured":"Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54(10), 1828\u20131832 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"795_CR11","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. December 1984"},{"key":"795_CR12","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"795_CR13","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"795_CR14","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"2","key":"795_CR15","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"795_CR16","doi-asserted-by":"crossref","unstructured":"Damgard, I.: A design principle for hash functions. In: Advances in Cryptology: Proceedings of CRYPTO\u201989. pp. 416\u2013427. Santa Barbara, California, USA. 20\u201324 August 1989","DOI":"10.1007\/0-387-34805-0_39"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0795-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0795-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0795-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T00:55:28Z","timestamp":1565657728000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0795-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,20]]},"references-count":16,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["795"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0795-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,7,20]]}}}