{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T22:18:46Z","timestamp":1773958726713,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T00:00:00Z","timestamp":1485993600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["s.11647128"],"award-info":[{"award-number":["s.11647128"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61309029"],"award-info":[{"award-number":["61309029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"publisher","award":["201607320084"],"award-info":[{"award-number":["201607320084"]}],"id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Natural Science Foundation of Heilongjiang Province under Grant","award":["A2016007"],"award-info":[{"award-number":["A2016007"]}]},{"name":"Youth Foundation of Heilongjaing University","award":["QL201501"],"award-info":[{"award-number":["QL201501"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1007\/s11128-017-1531-0","type":"journal-article","created":{"date-parts":[[2017,2,2]],"date-time":"2017-02-02T07:51:37Z","timestamp":1486021897000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption"],"prefix":"10.1007","volume":"16","author":[{"given":"Long","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hong-Wei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Ke-Jia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Heng-Yue","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,2,2]]},"reference":[{"issue":"5","key":"1531_CR1","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"1531_CR2","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. quant-ph\/9605043v3 (1996)","DOI":"10.1145\/237814.237866"},{"key":"1531_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"10","key":"1531_CR4","first-page":"2039","volume":"E96\u2013A","author":"L Xin","year":"2013","unstructured":"Xin, L., Qiaoyan, W., Tingting, S., Zhang, J.: Quantum Steganography with high efficiency with noisy depolarizing channels. IEICE Trans. Fundam. E96\u2013A(10), 2039\u20132044 (2013)","journal-title":"IEICE Trans. Fundam."},{"issue":"8","key":"1531_CR5","doi-asserted-by":"crossref","first-page":"2765","DOI":"10.1007\/s11128-013-0561-5","volume":"12","author":"Y-G Yang","year":"2013","unstructured":"Yang, Y.-G., Jia, X., Xu, P., Tian, J.: Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform. Quantum Inf. Process. 12(8), 2765\u20132769 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"1531_CR6","doi-asserted-by":"crossref","first-page":"2094","DOI":"10.1007\/s10773-012-1087-9","volume":"51","author":"N Fatahi","year":"2012","unstructured":"Fatahi, N., Naseri, M.: Quantum watermarking using entanglement swapping. Int. J. Theor. Phys. 51(7), 2094\u20132100 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"1531_CR7","doi-asserted-by":"crossref","first-page":"3689","DOI":"10.1007\/s11128-013-0629-2","volume":"12","author":"X-H Song","year":"2013","unstructured":"Song, X.-H., Wang, S., Liu, S., El-Latif, A.A.A., Niu, X.-M.: A dynamic watermarking scheme for quantum images using quantum wavelet transform. Quantum Inf. Process. 12(12), 3689\u20133706 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1531_CR8","doi-asserted-by":"crossref","first-page":"022310","DOI":"10.1103\/PhysRevA.83.022310","volume":"83","author":"BA Shaw","year":"2011","unstructured":"Shaw, B.A., Brun, T.A.: Quantum steganography with noisy quantum channels. Phys. Rev. A 83(2), 022310 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1531_CR9","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.jvcir.2014.12.007","volume":"28","author":"X Liao","year":"2015","unstructured":"Liao, X., Shu, C.: Reversible data hiding in encrypted images based on absolute mean difference of multiple neighboring pixels. J. Vis. Commun. Image Represent. 28(4), 21\u201327 (2015)","journal-title":"J. Vis. Commun. Image Represent."},{"key":"1531_CR10","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proc. IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179. IEEE Press, New York (1984)"},{"key":"1531_CR11","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bell theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR12","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR13","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., et al.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR14","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.physleta.2005.09.012","volume":"349","author":"F Gao","year":"2006","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53\u201358 (2006)","journal-title":"Phys. Lett. A"},{"key":"1531_CR15","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR16","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"1531_CR17","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1531_CR18","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1007\/s11128-012-0379-6","volume":"12","author":"XB Chen","year":"2013","unstructured":"Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Proc. 12(1), 365\u2013380 (2013)","journal-title":"Quantum Inf. Proc."},{"key":"1531_CR19","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"1531_CR20","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1531_CR21","doi-asserted-by":"crossref","first-page":"064304","DOI":"10.1103\/PhysRevA.78.064304","volume":"78","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.Y., Zhu, F.C.: Quantum secure direct communication with X-type entangled states. Phys. Rev. A 78, 064304 (2008)","journal-title":"Phys. Rev. A"},{"key":"1531_CR22","doi-asserted-by":"crossref","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1531_CR23","doi-asserted-by":"crossref","first-page":"1350010","DOI":"10.1142\/S021974991350010X","volume":"11","author":"XB Chen","year":"2013","unstructured":"Chen, X.B., Yang, S., Xu, G., Su, Y., Yang, Y.X.: Cryptanalysis of the quantum state sharing protocol using four sets of $$W$$ W -class states. Int. J. Quantum Inf. 11(1), 1350010 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"1531_CR24","doi-asserted-by":"crossref","first-page":"036301","DOI":"10.1103\/PhysRevA.63.036301","volume":"63","author":"YS Zhang","year":"2001","unstructured":"Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on \u201cQuantum key distribution without alternative measurements\u201d. Phys. Rev. A 63, 036301 (2001)","journal-title":"Phys. Rev. A"},{"key":"1531_CR25","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the bradler-dusek protocol. Quantum Inf. Comput. 7, 329 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"1531_CR26","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/17\/9\/006","volume":"17","author":"F Gao","year":"2008","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17, 3189 (2008)","journal-title":"Chin. Phys. B"},{"key":"1531_CR27","doi-asserted-by":"crossref","first-page":"630","DOI":"10.1109\/JQE.2011.2107889","volume":"47","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Dense-coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47, 630 (2011)","journal-title":"IEEE J. Quantum Electron."},{"key":"1531_CR28","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"SJ Qin","year":"2006","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)","journal-title":"Phys. Lett. A"},{"key":"1531_CR29","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u2019ojcik","year":"2003","unstructured":"W\u2019ojcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR30","doi-asserted-by":"crossref","first-page":"016301","DOI":"10.1103\/PhysRevA.71.016301","volume":"71","author":"A W\u2019ojcik","year":"2005","unstructured":"W\u2019ojcik, A.: Comment on \u201cQuantum dense key distribution\u201d. Phys. Rev. A 71, 016301 (2005)","journal-title":"Phys. Rev. A"},{"key":"1531_CR31","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.physleta.2006.08.016","volume":"360","author":"F Gao","year":"2007","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: \u201cQuantum exam\u201d. Phys. Lett. A 360, 748 (2007)","journal-title":"Phys. Lett. A"},{"key":"1531_CR32","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus $$N$$ N -receiver QSDC protocol. Chin. Phys. Lett. 25, 1561 (2008)","journal-title":"Chin. Phys. Lett."},{"key":"1531_CR33","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 283, 192 (2010)","journal-title":"Opt. Commun."},{"key":"1531_CR34","doi-asserted-by":"crossref","first-page":"109801","DOI":"10.1103\/PhysRevLett.91.109801","volume":"91","author":"QY Cai","year":"2003","unstructured":"Cai, Q.Y.: The \u201cping-pong\u201d protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR35","doi-asserted-by":"crossref","first-page":"014302","DOI":"10.1103\/PhysRevA.77.014302","volume":"77","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77, 014302 (2008)","journal-title":"Phys. Rev. A"},{"key":"1531_CR36","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"},{"key":"1531_CR37","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"1531_CR38","doi-asserted-by":"crossref","first-page":"055002","DOI":"10.1088\/0031-8949\/86\/05\/055002","volume":"86","author":"XB Chen","year":"2012","unstructured":"Chen, X.B., Yang, S., Su, Y., Yang, Y.X.: Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the GHZ state. Phys. Scr. 86, 055002 (2012)","journal-title":"Phys. Scr."},{"key":"1531_CR39","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. quant-ph\/0105032v2 (2001)"},{"key":"1531_CR40","doi-asserted-by":"crossref","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., et al.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"1531_CR41","volume-title":"Authentication of Quantum Messages","author":"H Buhrman","year":"2002","unstructured":"Buhrman, H., Crepeau, C., Gottesman, D., et al.: Authentication of Quantum Messages. IEEE Computer Society Press, Washington, DC (2002). pp 449\u2013458"},{"key":"1531_CR42","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"1531_CR43","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"1531_CR44","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"XF Zou","year":"2010","unstructured":"Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1531_CR45","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"1531_CR46","doi-asserted-by":"crossref","first-page":"062330","DOI":"10.1103\/PhysRevA.84.062330","volume":"84","author":"JW Choi","year":"2011","unstructured":"Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1531_CR47","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1007\/s10773-014-2250-2","volume":"54","author":"KJ Zhang","year":"2015","unstructured":"Zhang, K.J., Jia, H.Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theor. Phys. 54(2), 582\u2013588 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"1531_CR48","doi-asserted-by":"crossref","first-page":"056301","DOI":"10.1103\/PhysRevA.85.056301","volume":"85","author":"T Hwang","year":"2012","unstructured":"Hwang, T., Luo, Y.P., Chong, S.K.: Comment on: \u201cSecurity analysis and improvements of arbitrated quantum signature schemes\u201d. Phys. Rev. A 85, 056301 (2012)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"1531_CR49","doi-asserted-by":"crossref","first-page":"3127","DOI":"10.1007\/s11128-013-0589-6","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Qin, S.J., Sun, Y., et al.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127\u20133141 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"1531_CR50","doi-asserted-by":"crossref","first-page":"2171","DOI":"10.1007\/s11128-015-0981-5","volume":"14","author":"FG Li","year":"2015","unstructured":"Li, F.G., Shi, J.H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14(6), 2171\u20132181 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1531_CR51","unstructured":"Luo, Y.P., Hwang, T.: Comment on \u201cAn arbitrated quantum signature protocol based on the chained CNOT operations encryption\u201d. Preprint arXiv:1512.00711 (2015)"},{"issue":"8","key":"1531_CR52","doi-asserted-by":"crossref","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655\u20132669 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1531_CR53","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1007\/s10773-013-1780-3","volume":"53","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28\u201338 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"1531_CR54","doi-asserted-by":"crossref","first-page":"060309","DOI":"10.1088\/1674-1056\/23\/6\/060309","volume":"23","author":"W Chao","year":"2014","unstructured":"Chao, W., Jian-Wei, L., Tao, S.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)","journal-title":"Chin. Phys. B"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1531-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1531-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T01:49:30Z","timestamp":1568771370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1531-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2,2]]},"references-count":54,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,3]]}},"alternative-id":["1531"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1531-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2,2]]},"article-number":"70"}}