{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T06:19:11Z","timestamp":1774937951273,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11128-020-02962-5","type":"journal-article","created":{"date-parts":[[2021,1,11]],"date-time":"2021-01-11T10:49:10Z","timestamp":1610362150000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":36,"title":["Security analysis and improvement of a quantum multi-signature protocol"],"prefix":"10.1007","volume":"20","author":[{"given":"Qianqian","family":"He","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5383-6176","authenticated-orcid":false,"given":"Xiangjun","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Qinglan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,11]]},"reference":[{"issue":"3","key":"2962_CR1","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1080\/19361610.2017.1315761","volume":"12","author":"P Sarde","year":"2017","unstructured":"Sarde, P., Banerjee, A., Dewangan, C.L.: A secure ID based group signature scheme based on factoring and discrete logarithm problem. J. Appl. Security Res. 12(3), 440\u2013446 (2017)","journal-title":"J. Appl. Security Res."},{"issue":"6925019","key":"2962_CR2","first-page":"1","volume":"2018","author":"WW Liu","year":"2018","unstructured":"Liu, W.W., Mu, Y., Yang, G.M., Tian, Y.G.: Strong identity-based proxy signature schemes, revisited. Wireless Commun. Mobile Comput. 2018(6925019), 1\u201311 (2018)","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"5","key":"2962_CR3","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1002\/sec.582","volume":"6","author":"ZW Tan","year":"2013","unstructured":"Tan, Z.W.: Efficient pairing-free provably secure identity-based proxy blind signature scheme. Security Commun. Netw. 6(5), 593\u2013601 (2013)","journal-title":"Security Commun. Netw."},{"key":"2962_CR4","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1016\/j.ins.2018.12.020","volume":"479","author":"P Rastegari","year":"2019","unstructured":"Rastegari, P., Berenjkoub, M., Dakhilalian, M., Susilo, W.: Universal designated verifier signature scheme with non-delegatability in the standard model. Inform. Sci. 479, 321\u2013334 (2019)","journal-title":"Inform. Sci."},{"issue":"2","key":"2962_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"2962_CR6","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv: quant-ph\/0105032 (2001)"},{"issue":"4","key":"2962_CR7","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2962_CR8","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2962_CR9","doi-asserted-by":"publisher","first-page":"42325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 42325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"8","key":"2962_CR10","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Zhang, W.W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12(8), 2655\u20132669 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"2962_CR11","doi-asserted-by":"publisher","first-page":"2135","DOI":"10.1007\/s10773-012-1093-y","volume":"51","author":"MX Luo","year":"2012","unstructured":"Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 51(7), 2135\u20132142 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"2962_CR12","doi-asserted-by":"publisher","first-page":"3343","DOI":"10.1007\/s10773-013-1631-2","volume":"52","author":"Q Su","year":"2013","unstructured":"Su, Q., Li, W.M.: Improved quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 52(9), 3343\u20133352 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"2962_CR13","doi-asserted-by":"publisher","first-page":"060309","DOI":"10.1088\/1674-1056\/23\/6\/060309","volume":"23","author":"C Wang","year":"2014","unstructured":"Wang, C., Liu, J.W., Shang, T.: Enhanced arbitrated quantum signature scheme using Bell states. Chin. Phys. B 23(6), 060309 (2014)","journal-title":"Chin. Phys. B"},{"issue":"1","key":"2962_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s10773-013-1780-3","volume":"53","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Xu, K., Guo, Y.: A chaos-based arbitrated quantum signature scheme in quantum crypotosystem. Int. J. Theor. Phys. 53(1), 28\u201338 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"2962_CR15","doi-asserted-by":"publisher","first-page":"994","DOI":"10.1007\/s10773-017-3632-z","volume":"57","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Zeng, J.: An improved arbitrated quantum scheme with Bell states. Int. J. Theor. Phys. 57, 994\u20131003 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"2962_CR16","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/s10773-018-03995-4","volume":"58","author":"DH Jiang","year":"2019","unstructured":"Jiang, D.H., Xu, Y.L., Xu, G.B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 1036\u20131045 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"2962_CR17","doi-asserted-by":"publisher","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2962_CR18","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/s10773-013-1808-8","volume":"53","author":"F Liu","year":"2014","unstructured":"Liu, F., Zhang, K., Cao, T.: Security weaknesses in arbitrated quantum signature protocols. Int. J. Theor. Phys. 53(1), 277\u2013288 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"2962_CR19","doi-asserted-by":"publisher","first-page":"4335","DOI":"10.1007\/s10773-013-1751-8","volume":"52","author":"Q Li","year":"2013","unstructured":"Li, Q., Chan, W.H., Wu, C., Wen, Z.: On the existence of quantum signature for quantum Messages. Int. J. Theor. Phys. 52(12), 4335\u20134341 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"2962_CR20","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1007\/s11128-013-0589-6","volume":"12","author":"KJ Zhang","year":"2013","unstructured":"Zhang, K.J., Qin, S.J., Sun, Y., Song, T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quantum Inf. Process. 12(9), 3127\u20133141 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2962_CR21","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1007\/s10773-013-1988-2","volume":"53","author":"MS Kang","year":"2014","unstructured":"Kang, M.S., Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Comment on \u201cQuantum Signature Scheme with Weak Arbitrator\u201d. Int. J. Theor. Phys. 53(6), 1862\u20131866 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"2962_CR22","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/s10773-013-1846-2","volume":"53","author":"X Zou","year":"2014","unstructured":"Zou, X., Qiu, D., Yu, F., Mateus, P.: Security problems in the quantum signature scheme with a weak arbitrator. Int. J. Theor. Phys. 53(2), 603\u2013611 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"2962_CR23","doi-asserted-by":"publisher","first-page":"015307","DOI":"10.1088\/1751-8113\/46\/1\/015307","volume":"46","author":"Q Li","year":"2013","unstructured":"Li, Q., Li, C., Wen, Z., Zhao, W., Chan, W.: On the security of arbitrated quantum signature schemes. J. Phys. A: Math. Theor. 46(1), 015307 (2013)","journal-title":"J. Phys. A: Math. Theor."},{"key":"2962_CR24","doi-asserted-by":"publisher","first-page":"056301","DOI":"10.1103\/PhysRevA.85.056301","volume":"85","author":"T Hwang","year":"2012","unstructured":"Hwang, T., Luo, Y.P., Chong, S.K.: Comment on: \u201cSecurity analysis and improvements of arbitrated quantum signature schemes\u201d. Phys. Rev. A 85, 056301 (2012)","journal-title":"Phys. Rev. A"},{"key":"2962_CR25","doi-asserted-by":"publisher","first-page":"2433","DOI":"10.1007\/s10773-017-3394-7","volume":"56","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Sun, H.W., Zhang, K.J., Wang, Q.L., Cai, X.Q.: The security problems in some novel arbitrated quantum signature protocols. Int. J. Theor. Phys. 56, 2433\u20132444 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"2962_CR26","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.ijleo.2019.05.078","volume":"189","author":"XJ Xin","year":"2019","unstructured":"Xin, X.J., He, Q.Q., Wang, Z., Yang, Q.L., Li, F.G.: Security analysis and improvement of an arbitrated quantum signature scheme. Optik 189, 23\u201331 (2019)","journal-title":"Optik"},{"key":"2962_CR27","unstructured":"Yu, S. X., Oh, C. H.: Detecting the local indistinguishability of maximally entangled states. arXiv:1502.01274"},{"issue":"3","key":"2962_CR28","doi-asserted-by":"publisher","first-page":"032313","DOI":"10.1103\/PhysRevA.92.032313","volume":"92","author":"YL Wang","year":"2015","unstructured":"Wang, Y.L., Li, M.S., Zheng, Z.J., Fei, S.M.: Nonlocality of orthogonal product-basis quantum states. Phys. Rev. A 92(3), 032313 (2015)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2962_CR29","doi-asserted-by":"publisher","first-page":"012314","DOI":"10.1103\/PhysRevA.93.012314","volume":"A93","author":"ZC Zhang","year":"2016","unstructured":"Zhang, Z.C., Gao, F., Cao, Y., Qin, S.J., Wen, Q.Y.: Local indistinguishability of orthogonal product states. Phys. Rev. A93(1), 012314 (2016)","journal-title":"Phys. Rev."},{"key":"2962_CR30","doi-asserted-by":"publisher","first-page":"31048","DOI":"10.1038\/srep31048","volume":"6","author":"GB Xu","year":"2016","unstructured":"Xu, G.B., Yang, Y.H., Wen, Q.Y., Qin, S.J., Gao, F.: Locally indistinguishable orthogonal product bases in arbitrary bipartite quantum system. Sci. Rep. 6, 31048 (2016)","journal-title":"Sci. Rep."},{"issue":"11","key":"2962_CR31","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/s11128-017-1725-5","volume":"16","author":"GB Xu","year":"2017","unstructured":"Xu, G.B., Wen, Q.Y., Gao, F., Qin, S.J., Zuo, H.J.: Local indistinguishability of multipartite orthogonal product bases. Quantum Inf. Process. 16(11), 276 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"2962_CR32","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/s11128-019-2382-7","volume":"18","author":"DH Jiang","year":"2019","unstructured":"Jiang, D.H., Hu, Q.Z., Liang, X.Q., Xu, G.B.: A novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Quantum Inf. Process. 18(9), 268 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"2962_CR33","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.93.032341","volume":"93","author":"GB Xu","year":"2016","unstructured":"Xu, G.B., Wen, Q.Y., Qin, S.J., Yang, Y.X., Gao, F.: Quantum nonlocality of multipartite orthogonal product states. Phys. Rev. A 93(3), 032341 (2016)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"2962_CR34","doi-asserted-by":"publisher","first-page":"147901","DOI":"10.1103\/PhysRevLett.89.147901","volume":"89","author":"J Walgate","year":"2002","unstructured":"Walgate, J., Hardy, L.: Nonlocality, asymmetry, and distinguishing bipartite states. Phys. Rev. Lett. 89(14), 147901 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2962_CR35","unstructured":"Bennett, C. H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers Systems and, Signal Processing, pp. 175\u2013179 (1984)"},{"issue":"2","key":"2962_CR36","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2962_CR37","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1996","unstructured":"Menezes, A.J., Oorschot, P.V., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, USA (1996)"},{"key":"2962_CR38","unstructured":"Yang, L., Yang, B., Pan, J.: Quantum public-key encryption with information theoretic security. Proc. SPIE 8440, 84400E\u2009\u2212\u20091-7 (2010)"},{"issue":"2","key":"2962_CR39","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/CC.2013.6472855","volume":"10","author":"L Yang","year":"2013","unstructured":"Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption scheme based on conjugate coding. China Commun. 10(2), 19\u201326 (2013)","journal-title":"China Commun."},{"key":"2962_CR40","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"2962_CR41","doi-asserted-by":"publisher","first-page":"3483","DOI":"10.1007\/s11128-015-1060-7","volume":"14","author":"YF He","year":"2015","unstructured":"He, Y.F., Ma, W.P.: Quantum key agreement protocols with four-qubit cluster states. Quantum Inf. Process. 14(9), 3483\u20133498 (2015)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02962-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-02962-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02962-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T08:40:04Z","timestamp":1612946404000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-02962-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2962"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02962-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"5 January 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"26"}}