{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,19]],"date-time":"2025-11-19T17:15:41Z","timestamp":1763572541707,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T00:00:00Z","timestamp":1594684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572246","61602232"],"award-info":[{"award-number":["61572246","61602232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11128-020-02744-z","type":"journal-article","created":{"date-parts":[[2020,7,14]],"date-time":"2020-07-14T07:02:53Z","timestamp":1594710173000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Analysis of efficient quantum multi-proxy signature"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6237-4364","authenticated-orcid":false,"given":"Tian-Yin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiao-Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiao-Qiu","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Rui-Ling","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,14]]},"reference":[{"issue":"A(9)","key":"2744_CR1","first-page":"1338","volume":"E79","author":"M Mambo","year":"1996","unstructured":"Mambo, M., Usuda, K., Okamoto, E.: Proxy signature: delegation of the power to signmessages. IEICE Trans. Fundam. E79(A(9)), 1338\u20131353 (1996)","journal-title":"IEICE Trans. Fundam."},{"issue":"5","key":"2744_CR2","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11128-010-0225-7","volume":"10","author":"JJ Shi","year":"2011","unstructured":"Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653\u2013670 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2744_CR3","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s11128-011-0258-6","volume":"11","author":"TY Wang","year":"2012","unstructured":"Wang, T.Y., Wei, Z.L.: One-time proxy signature based on quantum cryptography. Quantum Inf. Process. 11(2), 455\u2013463 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"2744_CR4","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1007\/s11128-012-0477-5","volume":"12","author":"XQ Cai","year":"2013","unstructured":"Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature. Quant. Inf. Process. 12(4), 1651\u20131657 (2013)","journal-title":"Quant. Inf. Process."},{"key":"2744_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.ins.2014.02.043","volume":"276","author":"HZ Du","year":"2014","unstructured":"Du, H.Z., Wen, Q.Y.: Certificateless proxy multi-signature. Inf. Sci. 276, 21\u201330 (2014)","journal-title":"Inf. Sci."},{"issue":"8","key":"2744_CR6","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s11433-008-0062-1","volume":"51","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G., Wen, Q.Y.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. China Ser. G Phys. Astron. 51(8), 1079\u20131088 (2008)","journal-title":"Sci. China Ser. G Phys. Astron."},{"key":"2744_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11128-018-2169-2","volume":"18","author":"HW Qin","year":"2019","unstructured":"Qin, H.W., Tang Wallace, K.S., Tso, R.: Efficient quantummulti-proxy signature. Quantum Inf. Process. 18, 53 (2019)","journal-title":"Quantum Inf. Process."},{"key":"2744_CR8","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"QY Cai","year":"2004","unstructured":"Cai, Q.Y., Li, W.B.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601\u2013603 (2004)","journal-title":"Chin. Phys. Lett."},{"key":"2744_CR9","doi-asserted-by":"crossref","unstructured":"Hanaoka, G., Shikata, J., Zheng, Y.L., et al.: Unconditionally secure digital signature schemes admitting transferability. In: Advances in Cryptology, pp. 130\u2013142. Springer, Berlin (2000)","DOI":"10.1007\/3-540-44448-3_11"},{"key":"2744_CR10","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph\/0105032 (2001)"},{"key":"2744_CR11","doi-asserted-by":"publisher","first-page":"1174","DOI":"10.1038\/ncomms2172","volume":"3","author":"PJ Clarke","year":"2012","unstructured":"Clarke, P.J., Collins, R.J., Dunjko, V., et al.: Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light. Nat. Commun. 3, 1174 (2012)","journal-title":"Nat. Commun."},{"issue":"7","key":"2744_CR12","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.1007\/s11128-013-0524-x","volume":"12","author":"HJ Zuo","year":"2013","unstructured":"Zuo, H.J., Zhang, K.J., Song, T.T.: Security analysis of quantum multi-signature protocol based on teleportation. Quantum Inf. Process. 12(7), 2343\u20132353 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2744_CR13","doi-asserted-by":"publisher","first-page":"040502","DOI":"10.1103\/PhysRevLett.112.040502","volume":"112","author":"V Dunjko","year":"2014","unstructured":"Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112, 040502 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"2744_CR14","doi-asserted-by":"publisher","first-page":"040502","DOI":"10.1103\/PhysRevLett.113.040502","volume":"113","author":"RJ Collins","year":"2014","unstructured":"Collins, R.J., Donaldson, R.J., Vedran, D., et al.: Realization of quantum digital signatures without the requirement of quantum memory. Phys. Rev. Lett. 113, 040502 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"2744_CR15","doi-asserted-by":"publisher","first-page":"042304","DOI":"10.1103\/PhysRevA.91.042304","volume":"91","author":"P Wallden","year":"2015","unstructured":"Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum key distribution components. Phys. Rev. A 91, 042304 (2015)","journal-title":"Phys. Rev. A"},{"key":"2744_CR16","doi-asserted-by":"publisher","first-page":"9231","DOI":"10.1038\/srep09231","volume":"5","author":"TY Wang","year":"2015","unstructured":"Wang, T.Y., Cai, X.Q., Ren, Y.L., et al.: Security of quantum digital signatures for classical messages. Sci. Rep. 5, 9231 (2015)","journal-title":"Sci. Rep."},{"key":"2744_CR17","doi-asserted-by":"publisher","first-page":"012329","DOI":"10.1103\/PhysRevA.93.012329","volume":"93","author":"RJ Donaldson","year":"2016","unstructured":"Donaldson, R.J., Collins, R.J., Kleczkowska, K., et al.: Experimental demonstration of kilometer-range quantum digital signatures. Phys. Rev. A 93, 012329 (2016)","journal-title":"Phys. Rev. A"},{"key":"2744_CR18","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.93.032325","volume":"93","author":"R Amiri","year":"2016","unstructured":"Amiri, R., Wallden, P., Kent, A., et al.: Secure quantum signatures using insecure quantum channels. Phys. Rev. A 93, 032325 (2016)","journal-title":"Phys. Rev. A"},{"key":"2744_CR19","doi-asserted-by":"publisher","first-page":"032316","DOI":"10.1103\/PhysRevA.93.032316","volume":"93","author":"HL Yin","year":"2016","unstructured":"Yin, H.L., Fu, Y., Chen, Z.B.: Practical quantum digital signature. Phys. Rev. A 93, 032316 (2016)","journal-title":"Phys. Rev. A"},{"key":"2744_CR20","doi-asserted-by":"publisher","first-page":"4883","DOI":"10.1364\/OL.41.004883","volume":"41","author":"RJ Collins","year":"2016","unstructured":"Collins, R.J., Amiri, R., Fujiwara, M., et al.: Experimental transmission of quantum digital signatures over 90 km of installed optical fiber using a differential phase shift quantum key distribution system. Opt. Lett. 41, 4883\u20134886 (2016)","journal-title":"Opt. Lett."},{"key":"2744_CR21","doi-asserted-by":"publisher","first-page":"022328","DOI":"10.1103\/PhysRevA.94.022328","volume":"94","author":"IV Puthoor","year":"2016","unstructured":"Puthoor, I.V., Amiri, R., Wallden, P., et al.: Measurement-device-independent quantum digital signatures. Phys. Rev. A 94, 022328 (2016)","journal-title":"Phys. Rev. A"},{"key":"2744_CR22","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/s11128-016-1460-3","volume":"16","author":"TY Wang","year":"2017","unstructured":"Wang, T.Y., Ma, J.F., Cai, X.Q.: The postprocessing of quantum digital signatures. Quantum Inf. Process. 16, 19 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2744_CR23","doi-asserted-by":"publisher","first-page":"032334","DOI":"10.1103\/PhysRevA.95.032334","volume":"95","author":"HL Yin","year":"2017","unstructured":"Yin, H.L., Fu, Y., Liu, H., et al.: Experimental quantum digital signature over 102 km. Phys. Rev. A 95, 032334 (2017)","journal-title":"Phys. Rev. A"},{"key":"2744_CR24","doi-asserted-by":"publisher","first-page":"042338","DOI":"10.1103\/PhysRevA.95.042338","volume":"95","author":"HL Yin","year":"2017","unstructured":"Yin, H.L., Wang, M.L., Tang, Y.L., et al.: Experimental measurement-device-independent quantum digital signatures over a metropolitan network. Phys. Rev. A 95, 042338 (2017)","journal-title":"Phys. Rev. A"},{"key":"2744_CR25","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1038\/s41467-017-01245-5","volume":"8","author":"GL Roberts","year":"2017","unstructured":"Roberts, G.L., Lucamarini, M., Yuan, Z.L., et al.: Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8, 1098 (2017)","journal-title":"Nat. Commun."},{"key":"2744_CR26","first-page":"0435","volume":"6","author":"JM Arrazola","year":"2016","unstructured":"Arrazola, J.M., Wallden, P., Andersson, E.: Multiparty quantum signature schemes. Quantum Inf. Comput. 6, 0435 (2016)","journal-title":"Quantum Inf. Comput."},{"issue":"8","key":"2744_CR27","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/s11128-019-2365-8","volume":"18","author":"XQ Cai","year":"2019","unstructured":"Cai, X.Q., Wang, T.Y., Wei, C.Y., et al.: Cryptanalysis of multiparty quantum digital signatures. Quantum Inf. Process. 18(8), 252 (2019)","journal-title":"Quantum Inf. Process."},{"key":"2744_CR28","doi-asserted-by":"publisher","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., et al.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02744-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02744-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02744-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T23:43:22Z","timestamp":1633650202000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02744-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,14]]},"references-count":28,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2744"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02744-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,7,14]]},"assertion":[{"value":"28 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 July 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"241"}}