{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:36:31Z","timestamp":1761824191658,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T00:00:00Z","timestamp":1578355200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T00:00:00Z","timestamp":1578355200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["Grant No. 61602247"],"award-info":[{"award-number":["Grant No. 61602247"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["Grant No. BK20160840"],"award-info":[{"award-number":["Grant No. BK20160840"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11128-019-2567-0","type":"journal-article","created":{"date-parts":[[2020,1,7]],"date-time":"2020-01-07T08:03:06Z","timestamp":1578384186000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Quantum (t, n) threshold group signature based on Bell state"],"prefix":"10.1007","volume":"19","author":[{"given":"Huawang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Wallace K. S.","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"2567_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Aldleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2567_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1996","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41, 303\u2013332 (1996)","journal-title":"SIAM Rev."},{"key":"2567_CR3","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1007\/s001450010001","volume":"13","author":"R Gennaro","year":"2000","unstructured":"Gennaro, R., Rabin, T., Krawczyk, H.: RSA-based undeniable signatures. J. Cryptol. 13, 397\u2013416 (2000)","journal-title":"J. Cryptol."},{"key":"2567_CR4","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1, 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"2567_CR5","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., Wolf, R.D.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"2567_CR6","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"2567_CR7","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"2567_CR8","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1088\/0253-6102\/68\/3\/317","volume":"68","author":"HR Li","year":"2017","unstructured":"Li, H.R., Luo, M.X., Peng, D.Y., Wang, X.J.: An arbitrated quantum signature scheme without entanglement. Commun. Theor. Phys. 68, 317\u2013322 (2017)","journal-title":"Commun. Theor. Phys."},{"key":"2567_CR9","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Lei, H., Liu, Z.C., Zhou, Y.H., Shi, W.M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15, 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2567_CR10","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/s11128-017-1689-5","volume":"16","author":"K Li","year":"2017","unstructured":"Li, K., Shang, T., Liu, J.W.: Continuous-variable quantum homomorphic signature. Quantum Inf. Process. 16, 246 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2567_CR11","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1007\/s10773-016-3252-z","volume":"56","author":"W Li","year":"2017","unstructured":"Li, W., Shi, R.H., Guo, Y.: Blind quantum signature with blind quantum computation. Int. J. Theor. Phys. 56, 1108\u20131115 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"2567_CR12","doi-asserted-by":"publisher","first-page":"4283","DOI":"10.1007\/s11128-016-1383-z","volume":"15","author":"MH Zhang","year":"2016","unstructured":"Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15, 4283\u20134301 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2567_CR13","doi-asserted-by":"publisher","first-page":"042314","DOI":"10.1103\/PhysRevA.94.042314","volume":"94","author":"T Shang","year":"2016","unstructured":"Shang, T., Lei, Q., Liu, J.W.: Quantum random oracle model for quantum digital signature. Phys. Rev. A 94, 042314 (2016)","journal-title":"Phys. Rev. A"},{"key":"2567_CR14","doi-asserted-by":"publisher","first-page":"022328","DOI":"10.1103\/PhysRevA.94.022328","volume":"94","author":"IV Puthoor","year":"2016","unstructured":"Puthoor, I.V., Amiri, R., Wallden, P., Curty, M., Andersson, E.: Measurement-device-independent quantum digital signatures. Phys. Rev. A 94, 022328 (2016)","journal-title":"Phys. Rev. A"},{"key":"2567_CR15","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.93.032325","volume":"93","author":"R Amiri","year":"2016","unstructured":"Amiri, R., Wallden, P., Kent, A., Andersson, E.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93, 032325 (2016)","journal-title":"Phys. Rev. A"},{"key":"2567_CR16","doi-asserted-by":"publisher","first-page":"032334","DOI":"10.1103\/PhysRevA.95.032334","volume":"95","author":"HL Yin","year":"2017","unstructured":"Yin, H.L., Fu, Y., Liu, H., et al.: Experimental quantum digital signature over 102 km. Phys. Rev. A 95, 032334 (2017)","journal-title":"Phys. Rev. A"},{"key":"2567_CR17","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1038\/s41467-017-01245-5","volume":"8","author":"GL Roberts","year":"2017","unstructured":"Roberts, G.L., Lucamarini, M., Yuan, Z.L., et al.: Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8, 1098 (2017)","journal-title":"Nat. Commun."},{"key":"2567_CR18","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1007\/s11433-008-0145-z","volume":"51","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G., Wen, Q.Y.: Quantum threshold group signature. Sci. China Phys. Mech. Astron. 51, 1505\u20131514 (2008)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"2567_CR19","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s11433-008-0062-1","volume":"51","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. China Phys. Mech. Astron. 51, 1079\u20131088 (2008)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"2567_CR20","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"11","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 11, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2567_CR21","doi-asserted-by":"publisher","first-page":"1038","DOI":"10.1007\/s10773-011-0978-5","volume":"51","author":"JJ Shi","year":"2012","unstructured":"Shi, J.J., Shi, R.H., Guo, Y., Peng, X.Q., Lee, M.H., Park, D.S.: A (t, n)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transform. Int. J. Theor. Phys. 51, 1038\u20131049 (2012)","journal-title":"Int. J. Theor. Phys."},{"unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, pp. 175\u2013179 (1984)","key":"2567_CR22"},{"key":"2567_CR23","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X.F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2567_CR24","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"2567_CR25","doi-asserted-by":"publisher","first-page":"e16144","DOI":"10.1038\/lsa.2016.144","volume":"5","author":"JY Hu","year":"2016","unstructured":"Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)","journal-title":"Light Sci. Appl."},{"key":"2567_CR26","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2567-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2567-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2567-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:16:08Z","timestamp":1609892168000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2567-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,7]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["2567"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2567-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,1,7]]},"assertion":[{"value":"26 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"71"}}