{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:18:45Z","timestamp":1774937925462,"version":"3.50.1"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2015,5,29]],"date-time":"2015-05-29T00:00:00Z","timestamp":1432857600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Scientific Research Common Program of Beijing Municipal Commission of Education","award":["KM201510005016"],"award-info":[{"award-number":["KM201510005016"]}]},{"name":"the Importation and Development of High-Caliber Talents Project of Beijing Municipal Institutions","award":["CIT&TCD201304039"],"award-info":[{"award-number":["CIT&TCD201304039"]}]},{"name":"National Cipher Development Fund during the 12th Five-Year Plan Period","award":["MMJJ201401006"],"award-info":[{"award-number":["MMJJ201401006"]}]},{"name":"Basic Research Fund of Beijing University of Technology","award":["X4007999201501"],"award-info":[{"award-number":["X4007999201501"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11128-015-1036-7","type":"journal-article","created":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T06:01:38Z","timestamp":1437026498000},"page":"3019-3030","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["A new quantum blind signature with unlinkability"],"prefix":"10.1007","volume":"14","author":[{"given":"Wei-Min","family":"Shi","sequence":"first","affiliation":[]},{"given":"Jian-Biao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,29]]},"reference":[{"key":"1036_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signature for untraceable payments. In: Proceeding of CRYPTO\u201982, pp. 199\u2013203. (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"issue":"14","key":"1036_CR2","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1049\/el:19950815","volume":"31","author":"L Harn","year":"1995","unstructured":"Harn, L.: Cryptanalysis of the blind signature based on the discrete logarithm problem. Electron. Lett. 31(14), 1136\u20131137 (1995)","journal-title":"Electron. Lett."},{"issue":"4","key":"1036_CR3","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.optcom.2008.10.025","volume":"282","author":"X Wen","year":"2009","unstructured":"Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Opt. Commun. 282(4), 666\u2013669 (2009)","journal-title":"Opt. Commun."},{"issue":"6","key":"1036_CR4","first-page":"0307","volume":"19","author":"TY Wang","year":"2010","unstructured":"Wang, T.Y., Wen, Q.Y.: Fair quantum blind signatures. Chin. Phys. B 19(6), 0307 (2010)","journal-title":"Chin. Phys. B"},{"issue":"3","key":"1036_CR5","doi-asserted-by":"publisher","first-page":"030306","DOI":"10.1088\/1674-1056\/21\/3\/030306","volume":"21","author":"LB He","year":"2012","unstructured":"He, L.B., Huang, L.S., Yang, W., Xu, R.: Cryptanalysis of fair quantum blind signatures. Chin. Phys. B 21(3), 030306 (2012)","journal-title":"Chin. Phys. B"},{"key":"1036_CR6","doi-asserted-by":"publisher","first-page":"2071","DOI":"10.1007\/s11128-012-0509-1","volume":"12","author":"XF Zou","year":"2013","unstructured":"Zou, X.F., Qiu, D.W.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12, 2071\u20132085 (2013). doi:\n                    10.1007\/s11128-012-0509-1","journal-title":"Quantum Inf. Process."},{"issue":"21","key":"1036_CR7","doi-asserted-by":"publisher","first-page":"4408","DOI":"10.1016\/j.optcom.2010.06.061","volume":"283","author":"Q Su","year":"2010","unstructured":"Su, Q., Zheng, H., Qiaoyan, W., Wenmin, L.: Quantum blind signature based on two-state vector formalism. Opt. Commun. 283(21), 4408\u20134410 (2010)","journal-title":"Opt. Commun."},{"key":"1036_CR8","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/s11128-012-0362-2","volume":"12","author":"CW Yang","year":"2012","unstructured":"Yang, C.W., Hwang, T., Luo, Y.P.: Enhancement on \u201cquantum blind signature based on two-state vector formalism\u201d. Quantum Inf. Process. 12, 109\u2013117 (2012). doi:\n                    10.1007\/s11128-012-0362-2","journal-title":"Quantum Inf. Process."},{"key":"1036_CR9","doi-asserted-by":"publisher","unstructured":"Zhang, M., Xu, G.A., Xiu, B.C., Yang, S., Yang, Y.X.: Attack on the improved quantum blind signature protocol. Int. J. Theor. Phys. doi:\n                    10.1007\/s10773-012-1339-8\n                    \n                   (2012)","DOI":"10.1007\/s10773-012-1339-8"},{"key":"1036_CR10","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10773-011-0922-8","volume":"51","author":"X Yin","year":"2012","unstructured":"Yin, X., Ma, W., Liu, W.: A blind quantum signature scheme with \n                    \n                      \n                    \n                    $$\\chi $$\n                    \n                      \n                        \u03c7\n                      \n                    \n                  -type entangled states. Int. J. Theor. Phys. 51, 455\u2013461 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"1036_CR11","doi-asserted-by":"publisher","first-page":"1636","DOI":"10.1007\/s11433-013-5170-x","volume":"56","author":"MM Wang","year":"2013","unstructured":"Wang, M.M., Chen, X.B., Yang, Y.X.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. Astron. 56(9), 1636\u20131641 (2013). doi:\n                    10.1007\/s11433-013-5170-x","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"1036_CR12","doi-asserted-by":"publisher","first-page":"055006","DOI":"10.1088\/0031-8949\/86\/05\/055006","volume":"86","author":"MM Wang","year":"2012","unstructured":"Wang, M.M., Chen, X.B., Niu, X.X., Yang, Y.X.: Re-examining the security of blind quantum signature protocols. Phys. Scr. 86, 055006 (2012). (6pp)","journal-title":"Phys. Scr."},{"key":"1036_CR13","doi-asserted-by":"publisher","unstructured":"Zuo, H.J.: Cryptanalysis of quantum blind signature scheme. Int. J. Theor. Phys. doi:\n                    10.1007\/s10773-012-1337-x\n                    \n                   (2012)","DOI":"10.1007\/s10773-012-1337-x"},{"key":"1036_CR14","doi-asserted-by":"publisher","unstructured":"Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. doi:\n                    10.1007\/s11128-013-0529-5\n                    \n                   (2013)","DOI":"10.1007\/s11128-013-0529-5"},{"key":"1036_CR15","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signature for untraceable payments. In Advances in Cryptology, Crypto\u201982, pp. 199\u2013203. (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"1036_CR16","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C Bennett","year":"1993","unstructured":"Bennett, C., et al.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"1036_CR17","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India. New York: IEEE, pp. 175\u2013179 (1984)"},{"key":"1036_CR18","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"1036_CR19","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"P Boykin","year":"2003","unstructured":"Boykin, P., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1036_CR20","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/j.physa.2006.09.022","volume":"375","author":"N Zhou","year":"2007","unstructured":"Zhou, N., Liu, Y., Zeng, G., Xiong, J., Zhu, F.: Novel qubit block encryption algorithm with hybrid keys. Phys. A 375, 693\u2013698 (2007)","journal-title":"Phys. A"},{"key":"1036_CR21","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1036-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1036-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1036-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1036-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T12:28:31Z","timestamp":1583238511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1036-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,29]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["1036"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1036-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,29]]},"assertion":[{"value":"27 November 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2015","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2015","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}