{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T10:10:40Z","timestamp":1764238240526,"version":"3.37.3"},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T00:00:00Z","timestamp":1663891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872390","61972418"],"award-info":[{"award-number":["61872390","61972418"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Outstanding Youth Program of Education Department of Hunan","award":["21B0228"],"award-info":[{"award-number":["21B0228"]}]},{"name":"Changsha Municipal Natural Science Foundation","award":["kq2202293"],"award-info":[{"award-number":["kq2202293"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-022-03664-w","type":"journal-article","created":{"date-parts":[[2022,9,23]],"date-time":"2022-09-23T04:03:56Z","timestamp":1663905836000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["SKC-CCCO: an encryption algorithm for quantum group signature"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9909-5510","authenticated-orcid":false,"given":"Yanyan","family":"Feng","sequence":"first","affiliation":[]},{"given":"Jian","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Jinjing","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Ronghua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,23]]},"reference":[{"key":"3664_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D., Heyst, E.V.: Group signatures. In: Workshop on the Theory and Application of of Cryptographic Techniques Springer, pp. 257\u2013265 (1991)","DOI":"10.1007\/3-540-46416-6_22"},{"key":"3664_CR2","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Annual International Cryptology Conference Springer, pp. 410\u2013424 (1997)","DOI":"10.1007\/BFb0052252"},{"key":"3664_CR3","doi-asserted-by":"crossref","unstructured":"Bresson, E., Stern, J.: Efficient revocation in group signatures. In: International Workshop on Public Key Cryptography, pp. 190\u2013206. Springer (2001)","DOI":"10.1007\/3-540-44586-2_15"},{"key":"3664_CR4","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Annual international cryptology conference, pp. 255\u2013270. Springer (2000)","DOI":"10.1007\/3-540-44598-6_16"},{"key":"3664_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41, 303 (1999)","journal-title":"SIAM Rev."},{"key":"3664_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79, 325 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"3664_CR7","doi-asserted-by":"crossref","unstructured":"Nielsen, M.A., Chuang, I.: Quantum computation and quantum information (2002)","DOI":"10.1119\/1.1463744"},{"key":"3664_CR8","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802 (1982)","journal-title":"Nature"},{"key":"3664_CR9","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.physrep.2007.05.006","volume":"452","author":"P Busch","year":"2007","unstructured":"Busch, P., Heinonen, T., Lahti, P.: Heisenberg\u2019s uncertainty principle. Phys. Rep. 452, 155 (2007)","journal-title":"Phys. Rep."},{"key":"3664_CR10","doi-asserted-by":"publisher","first-page":"055001","DOI":"10.1088\/0031-8949\/81\/05\/055001","volume":"81","author":"X Wen","year":"2010","unstructured":"Wen, X., Tian, Y., Ji, L., Niu, X.: A group signature scheme based on quantum teleportation. Phys. Scr. 81, 055001 (2010)","journal-title":"Phys. Scr."},{"key":"3664_CR11","doi-asserted-by":"publisher","first-page":"693","DOI":"10.1016\/j.physa.2006.09.022","volume":"375","author":"N Zhou","year":"2007","unstructured":"Zhou, N., Liu, Y., Zeng, G., Xiong, J., Zhu, F.: Novel qubit block encryption algorithm with hybrid keys. Phys. A Stat. Mech. Appl. 375, 693 (2007)","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"3664_CR12","doi-asserted-by":"publisher","first-page":"3654","DOI":"10.1016\/j.optcom.2011.03.083","volume":"284","author":"R Xu","year":"2011","unstructured":"Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284, 3654 (2011)","journal-title":"Opt. Commun."},{"key":"3664_CR13","doi-asserted-by":"publisher","first-page":"4163","DOI":"10.1007\/s10773-013-1729-6","volume":"52","author":"K-J Zhang","year":"2013","unstructured":"Zhang, K.-J., Sun, Y., Song, T.-T., Zuo, H.-J.: Cryptanalysis of the quantum group signature protocols. Int. J. Theor. Phys. 52, 4163 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"3664_CR14","doi-asserted-by":"publisher","first-page":"045012","DOI":"10.1088\/0031-8949\/87\/04\/045012","volume":"87","author":"K Zhang","year":"2013","unstructured":"Zhang, K., Song, T., Zuo, H., Zhang, W.: A secure quantum group signature scheme based on bell states. Phys. Scr. 87, 045012 (2013)","journal-title":"Phys. Scr."},{"key":"3664_CR15","doi-asserted-by":"publisher","first-page":"16","DOI":"10.4236\/jsea.2013.65B004","volume":"6","author":"X Sun","year":"2013","unstructured":"Sun, X., Guo, Y., Shi, J., Zhang, W., Xiao, Q., Lee, M., et al.: Quantum group signature scheme based on Chinese remainder theorem. J. Softw. Eng. Appl. 6, 16 (2013)","journal-title":"J. Softw. Eng. Appl."},{"key":"3664_CR16","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1007\/s11128-015-0995-z","volume":"14","author":"G-B Xu","year":"2015","unstructured":"Xu, G.-B., Zhang, K.-J.: A novel quantum group signature scheme without using entangled states. Quantum Inf. Process. 14, 2577 (2015)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR17","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"3664_CR18","doi-asserted-by":"publisher","first-page":"2604","DOI":"10.1007\/s11771-015-2790-5","volume":"22","author":"X-P Lou","year":"2015","unstructured":"Lou, X.-P., Chen, Z.-G., Lee, M.H.: A chaos-based quantum group signature scheme in quantum cryptosystem. J. Central South Univ. 22, 2604 (2015)","journal-title":"J. Central South Univ."},{"key":"3664_CR19","doi-asserted-by":"publisher","first-page":"1650041","DOI":"10.1142\/S0219749916500416","volume":"14","author":"F Chen","year":"2016","unstructured":"Chen, F., Han, Z.: Quantum group signature scheme based on controlled quantum teleportation. Int. J. Quantum Inf. 14, 1650041 (2016)","journal-title":"Int. J. Quantum Inf."},{"key":"3664_CR20","doi-asserted-by":"publisher","first-page":"3524","DOI":"10.1007\/s10773-016-2979-x","volume":"55","author":"W Guo","year":"2016","unstructured":"Guo, W., Zhang, J.-Z., Li, Y.-P., An, W.: Multi-proxy strong blind quantum signature scheme. Int. J. Theor. Phys. 55, 3524 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"3664_CR21","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s10773-019-04093-9","volume":"58","author":"G Liu","year":"2019","unstructured":"Liu, G., Ma, W.-P., Cao, H., Lyu, L.-D.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theor. Phys. 58, 1999 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3664_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2567-0","volume":"19","author":"H Qin","year":"2020","unstructured":"Qin, H., Tang, W.K., Tso, R.: Quantum (t, n) threshold group signature based on bell state. Quantum Inf. Process. 19, 1 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03236-4","volume":"20","author":"M Gao","year":"2021","unstructured":"Gao, M., Yang, W., Liu, Y.: A novel quantum (t, n) threshold group signature based on d-dimensional quantum system. Quantum Inf. Process. 20, 1 (2021)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR24","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"3664_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1675-y","volume":"16","author":"Y Wang","year":"2017","unstructured":"Wang, Y., Shang, Y., Xue, P.: Generalized teleportation by quantum walks. Quantum Inf. Process. 16, 1 (2017)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR26","doi-asserted-by":"publisher","first-page":"60009","DOI":"10.1209\/0295-5075\/124\/60009","volume":"124","author":"Y Shang","year":"2019","unstructured":"Shang, Y., Wang, Y., Li, M., Lu, R.: Quantum communication protocols by quantum walks with two coins. EPL (Europhys. Lett.) 124, 60009 (2019)","journal-title":"EPL (Europhys. Lett.)"},{"key":"3664_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2527-8","volume":"19","author":"Y Chatterjee","year":"2020","unstructured":"Chatterjee, Y., Devrari, V., Behera, B.K., Panigrahi, P.K.: Experimental realization of quantum teleportation using coined quantum walks. Quantum Inf. Process. 19, 1 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR28","doi-asserted-by":"publisher","first-page":"015005","DOI":"10.1088\/2058-9565\/ab6025","volume":"5","author":"Y Shang","year":"2019","unstructured":"Shang, Y., Li, M.: Experimental realization of state transfer by quantum walks with two coins. Quantum Sci. Technol. 5, 015005 (2019)","journal-title":"Quantum Sci. Technol."},{"key":"3664_CR29","doi-asserted-by":"publisher","first-page":"042316","DOI":"10.1103\/PhysRevA.67.042316","volume":"67","author":"J Du","year":"2003","unstructured":"Du, J., Li, H., Xu, X., Shi, M., Wu, J., Zhou, X., Han, R.: Experimental implementation of the quantum random-walk algorithm. Phys. Rev. A 67, 042316 (2003)","journal-title":"Phys. Rev. A"},{"key":"3664_CR30","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1088\/1367-2630\/8\/5\/081","volume":"8","author":"X Zou","year":"2006","unstructured":"Zou, X., Dong, Y., Guo, G.: Optical implementation of one-dimensional quantum random walks using orbital angular momentum of a single photon. New J. Phys. 8, 81 (2006)","journal-title":"New J. Phys."},{"key":"3664_CR31","doi-asserted-by":"publisher","first-page":"20190274","DOI":"10.7498\/aps.68.20190274","volume":"68","author":"Y-Y Feng","year":"2019","unstructured":"Feng, Y.-Y., Shi, R.-H., Shi, J.-J., Guo, Y.: Arbitrated quantum signature scheme based on quantum walks. Acta Phys. Sin. 68, 20190274 (2019)","journal-title":"Acta Phys. Sin."},{"key":"3664_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2270-1","volume":"18","author":"Y Feng","year":"2019","unstructured":"Feng, Y., Shi, R., Shi, J., Zhou, J., Guo, Y.: Arbitrated quantum signature scheme with quantum walk-based teleportation. Quantum Inf. Process. 18, 1 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR33","doi-asserted-by":"publisher","first-page":"135301","DOI":"10.1088\/1751-8121\/ab766d","volume":"53","author":"Y Feng","year":"2020","unstructured":"Feng, Y., Shi, R., Shi, J., Zhao, W., Lu, Y., Tang, Y.: Arbitrated quantum signature protocol with boson sampling-based random unitary encryption. J. Phys. A Math. Theor. 53, 135301 (2020)","journal-title":"J. Phys. A Math. Theor."},{"key":"3664_CR34","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"3664_CR35","doi-asserted-by":"publisher","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"3664_CR36","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"K-J Zhang","year":"2013","unstructured":"Zhang, K.-J., Zhang, W.-W., Li, D.: Improving the security of arbitrated quantum signature against the forgery attack. Quantum Inf. Process. 12, 2655 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR37","doi-asserted-by":"publisher","first-page":"2171","DOI":"10.1007\/s11128-015-0981-5","volume":"14","author":"F-G Li","year":"2015","unstructured":"Li, F.-G., Shi, J.-H.: An arbitrated quantum signature protocol based on the chained CNOT operations encryption. Quantum Inf. Process. 14, 2171 (2015)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1531-0","volume":"16","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Sun, H.-W., Zhang, K.-J., Jia, H.-Y.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process. 16, 1 (2017)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2571-4","volume":"19","author":"K Sutradhar","year":"2020","unstructured":"Sutradhar, K., Om, H.: Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19, 1 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-020-65871-8","volume":"10","author":"K Sutradhar","year":"2020","unstructured":"Sutradhar, K., Om, H.: Hybrid quantum protocols for secure multiparty summation and multiplication. Sci. Rep. 10, 1 (2020)","journal-title":"Sci. Rep."},{"key":"3664_CR41","first-page":"2978","volume":"67","author":"K Sutradhar","year":"2020","unstructured":"Sutradhar, K., Om, H.: A generalized quantum protocol for secure multiparty summation. IEEE Trans. Circuits Syst. II Express Briefs 67, 2978 (2020)","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"3664_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-81799-z","volume":"11","author":"K Sutradhar","year":"2021","unstructured":"Sutradhar, K., Om, H.: An efficient simulation for quantum secure multiparty computation. Sci. Rep. 11, 1 (2021)","journal-title":"Sci. Rep."},{"key":"3664_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03334-3","volume":"20","author":"K Sutradhar","year":"2021","unstructured":"Sutradhar, K., Om, H.: A cost-effective quantum protocol for secure multi-party multiplication. Quantum Inf. Process. 20, 1 (2021)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR44","doi-asserted-by":"publisher","first-page":"3417","DOI":"10.1007\/s10773-021-04917-7","volume":"60","author":"K Sutradhar","year":"2021","unstructured":"Sutradhar, K., Om, H.: Secret sharing based multiparty quantum computation for multiplication. Int. J. Theor. Phys. 60, 3417 (2021)","journal-title":"Int. J. Theor. Phys."},{"key":"3664_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-021-96634-8","volume":"11","author":"K Sutradhar","year":"2021","unstructured":"Sutradhar, K., Om, H.: Enhanced (t, n) threshold d-level quantum secret sharing. Sci. Rep. 11, 1 (2021)","journal-title":"Sci. Rep."},{"key":"3664_CR46","doi-asserted-by":"publisher","first-page":"100419","DOI":"10.1016\/j.cosrev.2021.100419","volume":"41","author":"K Kadian","year":"2021","unstructured":"Kadian, K., Garhwal, S., Kumar, A.: Quantum walk and its application domains: a systematic review. Comput. Sci. Rev. 41, 100419 (2021)","journal-title":"Comput. Sci. Rev."},{"key":"3664_CR47","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s11128-012-0432-5","volume":"11","author":"SE Venegas-Andraca","year":"2012","unstructured":"Venegas-Andraca, S.E.: Quantum walks: a comprehensive review. Quantum Inf. Process. 11, 1015 (2012)","journal-title":"Quantum Inf. Process."},{"key":"3664_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11433-017-9132-y","volume":"61","author":"Y Yang","year":"2018","unstructured":"Yang, Y., Zhang, Y., Xu, G., Chen, X., Zhou, Y.-H., Shi, W.: Improving the efficiency of quantum hash function by dense coding of coin operators in discrete-time quantum walk. Sci. China Phys. Mech. Astron. 61, 1 (2018)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"3664_CR49","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography, In: Workshop on the theory and application of cryptographic techniques, pp. 475\u2013480. Springer (1984)","DOI":"10.1007\/3-540-39568-7_39"},{"key":"3664_CR50","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11425-014-4910-3","volume":"58","author":"X Lu","year":"2015","unstructured":"Lu, X., Zhang, L., Wang, Y., Chen, W., Huang, D., Li, D., Wang, S., He, D., Yin, Z., Zhou, Y., et al.: FPGA based digital phase-coding quantum key distribution system. Sci. China Phys. Mech. Astron. 58, 1 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"3664_CR51","doi-asserted-by":"publisher","first-page":"052302","DOI":"10.1103\/PhysRevA.95.052302","volume":"95","author":"P Huang","year":"2017","unstructured":"Huang, P., Huang, J., Wang, T., Li, H., Huang, D., Zeng, G.: Robust continuous-variable quantum key distribution against practical attacks. Phys. Rev. A 95, 052302 (2017)","journal-title":"Phys. Rev. A"},{"key":"3664_CR52","doi-asserted-by":"crossref","unstructured":"Ambainis, A., Bach, E., Nayak, A., Vishwanath, A., Watrous, J.: One-dimensional quantum walks, In: Proceedings of the Thirty-Third Annual ACM Symposium on Theory of Computing, pp. 37\u201349 (2001)","DOI":"10.1145\/380752.380757"},{"key":"3664_CR53","doi-asserted-by":"publisher","first-page":"052317","DOI":"10.1103\/PhysRevA.67.052317","volume":"67","author":"TA Brun","year":"2003","unstructured":"Brun, T.A., Carteret, H.A., Ambainis, A.: Quantum walks driven by many coins. Phys. Rev. A 67, 052317 (2003)","journal-title":"Phys. Rev. A"},{"key":"3664_CR54","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.scib.2021.11.002","volume":"67","author":"Y-B Sheng","year":"2021","unstructured":"Sheng, Y.-B., Zhou, L., Long, G.-L.: One-step quantum secure direct communication. Sci. Bull. 67, 367\u2013374 (2021)","journal-title":"Sci. Bull."},{"key":"3664_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11433-020-1576-y","volume":"63","author":"L Yang","year":"2020","unstructured":"Yang, L., Wu, J., Lin, Z., Yin, L., Long, G.: Quantum secure direct communication with entanglement source and single-photon measurement. Sci. China Phys. Mech. Astron. 63, 1 (2020)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"3664_CR56","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87, 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"3664_CR57","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"3664_CR58","doi-asserted-by":"publisher","first-page":"2129","DOI":"10.1142\/S0218127406015970","volume":"16","author":"G Alvarez","year":"2006","unstructured":"Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16, 2129 (2006)","journal-title":"Int. J. Bifurc. Chaos"},{"key":"3664_CR59","first-page":"1","volume":"5","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Pan, Q.-X., Sun, S.-J., Xu, P.: Novel image encryption based on quantum walks. Sci. Rep. 5, 1 (2015)","journal-title":"Sci. Rep."},{"key":"3664_CR60","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0001-8","volume":"6","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Xu, P., Yang, R., Zhou, Y.-H., Shi, W.-M.: Quantum hash function and its application to privacy amplification in quantum key distribution, pseudo-random number generation and image encryption. Sci. Rep. 6, 1 (2016)","journal-title":"Sci. Rep."},{"key":"3664_CR61","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0001-8","volume":"6","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Zhao, Q.-Q.: Novel pseudo-random number generator based on quantum random walks. Sci. Rep. 6, 1 (2016)","journal-title":"Sci. Rep."},{"key":"3664_CR62","doi-asserted-by":"publisher","first-page":"062330","DOI":"10.1103\/PhysRevA.84.062330","volume":"84","author":"JW Choi","year":"2011","unstructured":"Choi, J.W., Chang, K.-Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-022-03664-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-022-03664-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-022-03664-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,19]],"date-time":"2022-11-19T13:20:14Z","timestamp":1668864014000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-022-03664-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,23]]},"references-count":62,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2022,9]]}},"alternative-id":["3664"],"URL":"https:\/\/doi.org\/10.1007\/s11128-022-03664-w","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2022,9,23]]},"assertion":[{"value":"13 April 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 August 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 September 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"328"}}