{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:25:25Z","timestamp":1776288325915,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100008783","name":"National Research Council of Science and Technology","doi-asserted-by":"publisher","award":["CAP-18-08-KRISS"],"award-info":[{"award-number":["CAP-18-08-KRISS"]}],"id":[{"id":"10.13039\/501100008783","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2019R1I1A1A01042699"],"award-info":[{"award-number":["2019R1I1A1A01042699"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11128-019-2510-4","type":"journal-article","created":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T16:02:40Z","timestamp":1574784160000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Quantum digital signature in a network"],"prefix":"10.1007","volume":"19","author":[{"given":"Changho","family":"Hong","sequence":"first","affiliation":[]},{"given":"Jingak","family":"Jang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0946-7769","authenticated-orcid":false,"given":"Jino","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Hyung-Jin","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"key":"2510_CR1","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B.: Sorting out signature schemes. In: CCS \u201893 Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 74\u201385 (1993)","DOI":"10.1145\/168588.168597"},{"key":"2510_CR2","first-page":"717","volume-title":"Cryptography","author":"R Rivest","year":"1990","unstructured":"Rivest, R.: Cryptography, pp. 717\u2013775. Elsevier, Amsterdam (1990)"},{"key":"2510_CR3","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120 (1978)","journal-title":"Commun. ACM"},{"key":"2510_CR4","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"P Shor","year":"1999","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41, 303 (1999)","journal-title":"SIAM Rev."},{"key":"2510_CR5","first-page":"20","volume-title":"Algorithms for Quantum Computation: Discrete Logarithms and Factoring","author":"PW Shor","year":"1994","unstructured":"Shor, P.W.: Algorithms for Quantum Computation: Discrete Logarithms and Factoring, pp. 20\u201322. IEEE Computer Society Press, Los Alamitos (1994)"},{"key":"2510_CR6","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"5","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 5, 1484 (1997)","journal-title":"SIAM J. Comput."},{"key":"2510_CR7","unstructured":"Gottesman, D., Chuang, I.L.: Quantum digital signatures. e-print arXiv:quant-ph\/0105032 (2001)"},{"key":"2510_CR8","unstructured":"Buhrman, H., Crepeaum C., Gottesmanm D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of 43rd Annual IEEE Symposium on the Foundations of Computer Science (FOCS \u201802), pp. 449\u2013458 (2002)"},{"key":"2510_CR9","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"2510_CR10","doi-asserted-by":"publisher","first-page":"046301","DOI":"10.1103\/PhysRevA.77.046301","volume":"77","author":"M Curty","year":"2008","unstructured":"Curty, M., Lutkenhaus, N.: Comment on \u201cArbitrated quantum-signature scheme\u201d. Phys. Rev. A 77, 046301 (2008)","journal-title":"Phys. Rev. A"},{"key":"2510_CR11","doi-asserted-by":"publisher","first-page":"016301","DOI":"10.1103\/PhysRevA.78.016301","volume":"78","author":"GH Zeng","year":"2008","unstructured":"Zeng, G.H.: Reply to \u201cComment on \u2018Arbitrated quantum-signature scheme\u2019\u201d. Phys. Rev. A 78, 016301 (2008)","journal-title":"Phys. Rev. A"},{"key":"2510_CR12","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H Lee","year":"2004","unstructured":"Lee, H., Hong, C.H., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321, 295 (2004)","journal-title":"Phys. Lett. A"},{"key":"2510_CR13","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.physleta.2005.09.034","volume":"347","author":"J Wang","year":"2005","unstructured":"Wang, J., Zhang, Q., Liang, L.M., Tang, C.J.: Comment on: \u201cArbitrated quantum signature scheme with message recovery\u201d. Phys. Lett. A 347, 262 (2005)","journal-title":"Phys. Lett. A"},{"key":"2510_CR14","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"2510_CR15","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"84","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Unextendible product bases and extremal density matrices with positive partial transpose. Phys. Rev. A 84, 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"2510_CR16","doi-asserted-by":"publisher","first-page":"15103","DOI":"10.1088\/0031-8949\/90\/1\/015103","volume":"90","author":"CS Yoon","year":"2015","unstructured":"Yoon, C.S., Kang, M.S., Lim, J.I., Yang, H.J.: Quantum signature scheme based on a quantum search algorithm. Phys. Scr. 90, 15103 (2015)","journal-title":"Phys. Scr."},{"key":"2510_CR17","doi-asserted-by":"crossref","first-page":"130301","DOI":"10.7498\/aps.63.130301","volume":"63","author":"P Zhang","year":"2014","unstructured":"Zhang, P., Zhou, X.Q., Li, Z.W.: Identification scheme based on quantum teleportation for wireless communication networks. Acta Phys. Sin. 63, 130301 (2014)","journal-title":"Acta Phys. Sin."},{"key":"2510_CR18","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1038\/ncomms2172","volume":"3","author":"PJ Clarke","year":"2012","unstructured":"Clarke, P.J., Collins, R.J.: Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light. Nat. Commun. 3, 1174 (2012)","journal-title":"Nat. Commun."},{"key":"2510_CR19","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1126\/science.1220513","volume":"336","author":"PC Maurer","year":"2012","unstructured":"Maurer, P.C., et al.: Room-temperature quantum bit memory exceeding one second. Science 336, 1283 (2012)","journal-title":"Science"},{"key":"2510_CR20","doi-asserted-by":"publisher","first-page":"040502","DOI":"10.1103\/PhysRevLett.113.040502","volume":"113","author":"JC Robert","year":"2014","unstructured":"Robert, J.C., Ross, J.D., Vedran, D., Petros, W., Patrick, J.C., Erika, A., John, J., Gerald, S.B.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"2510_CR21","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"2510_CR22","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1140\/epjd\/e2010-10157-4","volume":"61","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773\u2013778 (2011)","journal-title":"Eur. Phys. J. D"},{"key":"2510_CR23","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10773-013-1808-8","volume":"53","author":"F Liu","year":"2014","unstructured":"Liu, F., Zhang, K., Cao, T.: Security weaknesses in arbitrated quantum signature protocols. Int. J. Theor. Phys. 53, 277 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"2510_CR24","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/s10773-014-2254-y","volume":"54","author":"MS Kang","year":"2015","unstructured":"Kang, M.S., Hong, C., Heo, J., Lim, J.I., Yang, H.J.: Quantum signature scheme using a single qubit rotation operator. Int. J. Theor. Phys. 54, 614\u2013629 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"2510_CR25","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1007\/s10773-012-1093-y","volume":"51","author":"MX Luo","year":"2012","unstructured":"Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 51, 2135 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"2510_CR26","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s11128-018-2029-0","volume":"17","author":"MS Kang","year":"2018","unstructured":"Kang, M.S., Choi, H.W., Pramanik, T., Han, S.W., Moon, S.: Universal quantum encryption for quantum signature using the swap test. Quantum Inf. Process. 17, 254 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2510_CR27","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2510_CR28","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the \u201cPing-Pong\u201d quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2510_CR29","doi-asserted-by":"publisher","first-page":"042326","DOI":"10.1103\/PhysRevA.87.042326","volume":"87","author":"M Pavi\u010di\u0107","year":"2013","unstructured":"Pavi\u010di\u0107, M.: In quantum direct communication an undetectable eavesdropper can always tell \u03a8 from \u03a6 Bell states in the message mode. Phys. Rev. A 87, 042326 (2013)","journal-title":"Phys. Rev. A"},{"key":"2510_CR30","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., van Oorschot, P.C., Vantone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)"},{"key":"2510_CR31","volume-title":"Cryptography and Network Security","author":"BA Forouzan","year":"2007","unstructured":"Forouzan, B.A.: Cryptography and Network Security. Mcgraw Hill International Edition, New York (2007)"},{"issue":"1","key":"2510_CR32","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.tcs.2007.03.013","volume":"378","author":"E Kashefi","year":"2007","unstructured":"Kashefi, E., Kerenidis, I.: Statistical zero knowledge and quantum one-way functions. Theor. Comput. Sci. 378(1), 101\u2013116 (2007)","journal-title":"Theor. Comput. Sci."},{"key":"2510_CR33","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1007\/s10773-011-0966-9","volume":"51","author":"MX Luo","year":"2012","unstructured":"Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum public-key cryptosystem. Int. J. Theor. Phys. 51, 912\u2013924 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"2510_CR34","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2510_CR35","doi-asserted-by":"publisher","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)","journal-title":"Phys. Rev. A"},{"key":"2510_CR36","doi-asserted-by":"publisher","first-page":"032301","DOI":"10.1103\/PhysRevA.72.032301","volume":"72","author":"C Branciard","year":"2005","unstructured":"Branciard, C., Gisin, N., Kraus, B., Scarani, V.: Security of two quantum cryptography protocols using the same four qubit states. Phys. Rev. A 72, 032301 (2005)","journal-title":"Phys. Rev. A"},{"key":"2510_CR37","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1088\/1674-1056\/17\/7\/005","volume":"17","author":"CY Li","year":"2008","unstructured":"Li, C.Y., Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum secure communication with a publicly known key. Chin. Phys. B 17, 2352 (2008)","journal-title":"Chin. Phys. B"},{"key":"2510_CR38","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1007\/s11128-014-0785-z","volume":"13","author":"D Shen","year":"2014","unstructured":"Shen, D., Ma, W., Wang, L.: Two-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 13, 2313\u20132324 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2510_CR39","doi-asserted-by":"publisher","first-page":"3732","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 3732 (2014)","journal-title":"Nat. Commun."},{"key":"2510_CR40","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11128-017-1573-3","volume":"16","author":"MH Zhang","year":"2017","unstructured":"Zhang, M.H., Fi, H.F., Xia, Z.Q., Feng, X.Y.: Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 16, 117 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2510_CR41","unstructured":"Stinson D.R.: Cyrptography: theory and practice, 3rd edn, pp. 281\u2013316. Chapman and Hall\/CRC (2005)"},{"key":"2510_CR42","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"2510_CR43","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.93.032325","volume":"93","author":"R Amiri","year":"2016","unstructured":"Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channel. Phys. Rev. A 93, 032325 (2016)","journal-title":"Phys. Rev. A"},{"key":"2510_CR44","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A 461, 207 (2005)","journal-title":"Proc. R. Soc. Lond. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2510-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2510-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2510-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T23:35:21Z","timestamp":1665099321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2510-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["2510"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2510-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"1 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 November 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"18"}}