{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:58:43Z","timestamp":1774605523150,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Joint Research and Development Fund of Wuyi University, Hong Kong and Macao","award":["2021WGALH16"],"award-info":[{"award-number":["2021WGALH16"]}]},{"name":"Guangdong Provincial Quantum Science Strategic Initiative","award":["GDZX2200001"],"award-info":[{"award-number":["GDZX2200001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundations of China","doi-asserted-by":"crossref","award":["61871205"],"award-info":[{"award-number":["61871205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Special Foundation in Key Fields for Universities of Guangdong Province","award":["2023ZDZX4060"],"award-info":[{"award-number":["2023ZDZX4060"]}]},{"name":"Education Science Planning Project of Guangdong Province","award":["2024GXJK273"],"award-info":[{"award-number":["2024GXJK273"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05138-9","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:18:40Z","timestamp":1774603120000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An arbitrated quantum signature scheme based on entanglement swapping and hash functions"],"prefix":"10.1007","volume":"25","author":[{"given":"Jianxiong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiangfu","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xueying","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xinting","family":"Su","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,27]]},"reference":[{"issue":"6","key":"5138_CR1","first-page":"365","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. Trans. Inf. Theory IT 22(6), 365\u2013390 (1976)","journal-title":"Trans. Inf. Theory IT"},{"issue":"2","key":"5138_CR2","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"2","key":"5138_CR3","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"5138_CR4","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint quant-ph\/0105032 (2001)"},{"issue":"5886","key":"5138_CR5","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"4","key":"5138_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.042105","volume":"67","author":"M Ozawa","year":"2003","unstructured":"Ozawa, M.: Universally valid reformulation of the Heisenberg uncertainty principle on noise and disturbance in measurement. Phys. Rev. A 67(4), 042105 (2003)","journal-title":"Phys. Rev. A"},{"key":"5138_CR7","series-title":"Computer Engineering & Applied Computing","first-page":"165","volume-title":"World Congress in Computer Science","author":"AO Hijaz","year":"2024","unstructured":"Hijaz, A.O., Yakubu, I., Baek, J.: Integrating secure quantum digital signature into quantum communications. In: World Congress in Computer Science. Computer Engineering & Applied Computing, pp. 165\u2013173. Springer, Las Vegas, NV, USA (2024)"},{"issue":"12","key":"5138_CR8","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1007\/s11128-023-04183-y","volume":"22","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Zhang, J.-H., Xin, X.-J., Li, C.-Y.: Quantum designated verifier signature without third party. Quantum Inf. Process. 22(12), 452 (2023)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"5138_CR9","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/s11128-022-03627-1","volume":"21","author":"H-M Chen","year":"2022","unstructured":"Chen, H.-M., Jia, H.-Y., Wu, X., Kong, H.-X., Wang, X.-L.: Public-key quantum signature for classical messages without third-party verification. Quantum Inf. Process. 21(8), 282 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5138_CR10","doi-asserted-by":"publisher","first-page":"14647","DOI":"10.1109\/ACCESS.2024.3355196","volume":"12","author":"S Prajapat","year":"2024","unstructured":"Prajapat, S., Kumar, P., Kumar, S., Das, A.K., Shetty, S., Hossain, M.S.: Designing high-performance identity-based quantum signature protocol with strong security. IEEE Access 12, 14647\u201314658 (2024)","journal-title":"IEEE Access"},{"issue":"1","key":"5138_CR11","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s11128-022-03763-8","volume":"22","author":"X Feng","year":"2022","unstructured":"Feng, X., Wu, H., Zhou, X., Yao, Y.: Quantum blind signature scheme for supply chain financial. Quantum Inf. Process. 22(1), 5 (2022)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5138_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10773-023-05534-2","volume":"63","author":"L Zhang","year":"2024","unstructured":"Zhang, L., Zhang, J.-H., Xin, X.-J., Huang, M., Li, C.-Y.: Quantum designated multi-verifier signature. Int. J. Theor. Phys. 63(1), 11 (2024)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"5138_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5138_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.-Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"5138_CR15","doi-asserted-by":"crossref","unstructured":"Zou, X., Qiu, D.: Arbitrated quantum signature schemes: Attacks and security. In: Frontiers in Algorithmics and Algorithmic Aspects in Information and Management: Third Joint International Conference, pp. 48\u201359. Springer, Dalian (2013)","DOI":"10.1007\/978-3-642-38756-2_8"},{"issue":"4","key":"5138_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"5138_CR17","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1140\/epjd\/e2010-10157-4","volume":"61","author":"Y-G Yang","year":"2011","unstructured":"Yang, Y.-G., Zhou, Z., Teng, Y.-W., Wen, Q.-Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61, 773\u2013778 (2011)","journal-title":"Eur. Phys. J. D"},{"key":"5138_CR18","doi-asserted-by":"publisher","first-page":"3295","DOI":"10.1007\/s10773-013-1626-z","volume":"52","author":"X Zou","year":"2013","unstructured":"Zou, X., Qiu, D., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52, 3295\u20133305 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"5138_CR19","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Lei, H., Liu, Z.-C., Zhou, Y.-H., Shi, W.-M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15, 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"key":"5138_CR20","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/s11128-019-2270-1","volume":"18","author":"Y Feng","year":"2019","unstructured":"Feng, Y., Shi, R., Shi, J., Zhou, J., Guo, Y.: Arbitrated quantum signature scheme with quantum walk-based teleportation. Quantum Inf. Process. 18, 154 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"05","key":"5138_CR21","doi-asserted-by":"publisher","first-page":"2050025","DOI":"10.1142\/S0219749920500252","volume":"18","author":"X-Y Zheng","year":"2020","unstructured":"Zheng, X.-Y., Kuang, C.: Arbitration quantum signature protocol based on XOR encryption. Int. J. Quantum Inf. 18(05), 2050025 (2020)","journal-title":"Int. J. Quantum Inf."},{"issue":"02","key":"5138_CR22","doi-asserted-by":"publisher","first-page":"2250008","DOI":"10.1142\/S0217732322500080","volume":"37","author":"L Ding","year":"2022","unstructured":"Ding, L., Xin, X., Yang, Q., Sang, Y.: Security analysis and improvements of XOR arbitrated quantum signature-based GHZ state. Mod. Phys. Lett. A 37(02), 2250008 (2022)","journal-title":"Mod. Phys. Lett. A"},{"key":"5138_CR23","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/s11128-022-03730-3","volume":"21","author":"X Xin","year":"2022","unstructured":"Xin, X., Ding, L., Zhang, T., Yang, Q., Li, C.: Provably secure arbitrated-quantum signature. Quantum Inf. Process. 21, 390 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5138_CR24","doi-asserted-by":"crossref","unstructured":"Zhang, T., Li, C., Xin, X.: Secure arbitrated quantum signature scheme with Bell state. In: International Conference on Frontiers in Cyber Security, pp. 283\u2013294. Springer, Singapore (2023)","DOI":"10.1007\/978-981-99-9331-4_19"},{"issue":"11","key":"5138_CR25","doi-asserted-by":"publisher","first-page":"2400110","DOI":"10.1002\/qute.202400110","volume":"7","author":"S Xiong","year":"2024","unstructured":"Xiong, S., Tang, B., Han, H., Huang, J., Bai, M., Li, F., Yu, W., Mo, Z., Liu, B.: Efficient arbitrated quantum digital signature with multi-receiver verification. Adv. Quantum Technol. 7(11), 2400110 (2024)","journal-title":"Adv. Quantum Technol."},{"issue":"7","key":"5138_CR26","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1103\/PhysRevLett.86.1370","volume":"86","author":"Y-H Kim","year":"2001","unstructured":"Kim, Y.-H., Kulik, S.P., Shih, Y.: Quantum teleportation of a polarization state with a complete Bell state measurement. Phys. Rev. Lett. 86(7), 1370 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"16","key":"5138_CR27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"5138_CR28","doi-asserted-by":"publisher","first-page":"3239","DOI":"10.1007\/s10773-019-04199-0","volume":"58","author":"X-Q Zhao","year":"2019","unstructured":"Zhao, X.-Q., Chen, H.-Y., Wang, Y.-Q., Zhou, N.-R.: Semi-quantum bi-signature scheme based on W states. Int. J. Theor. Phys. 58(10), 3239\u20133251 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"5138_CR29","doi-asserted-by":"publisher","first-page":"3145","DOI":"10.1007\/s10773-020-04568-0","volume":"59","author":"T Zheng","year":"2020","unstructured":"Zheng, T., Chang, Y., Yan, L., Zhang, S.-B.: Semi-quantum proxy signature scheme with quantum walk-based teleportation. Int. J. Theor. Phys. 59(10), 3145\u20133155 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"5138_CR30","doi-asserted-by":"publisher","first-page":"3685","DOI":"10.1007\/s10773-020-04605-y","volume":"59","author":"L-Y Chen","year":"2020","unstructured":"Chen, L.-Y., Liao, Q., Tan, R.-C., Gong, L.-H., Chen, H.-Y.: Offline arbitrated semi-quantum signature scheme with four-particle cluster state. Int. J. Theor. Phys. 59(12), 3685\u20133695 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"5138_CR31","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1140\/epjp\/s13360-021-01605-7","volume":"136","author":"C Xia","year":"2021","unstructured":"Xia, C., Li, H., Hu, J.: A semi-quantum blind signature protocol based on five-particle GHZ state. Eur. Phys. J. Plus 136(6), 633 (2021)","journal-title":"Eur. Phys. J. Plus"},{"issue":"10","key":"5138_CR32","doi-asserted-by":"publisher","first-page":"4006","DOI":"10.1007\/s10773-021-04899-6","volume":"60","author":"B Chen","year":"2021","unstructured":"Chen, B., Yan, L.: Quantum and semi-quantum blind signature schemes based on entanglement swapping. Int. J. Theor. Phys. 60(10), 4006\u20134014 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"19","key":"5138_CR33","doi-asserted-by":"crossref","first-page":"1927001","DOI":"10.3788\/LOP202259.1927001","volume":"59","author":"J Wang","year":"2022","unstructured":"Wang, J., Li, Y., Guo, H., Wei, J.: Semi-quantum blind signature against collective noise (in Chinese). Laser Optoelectron. Progress 59(19), 1927001 (2022)","journal-title":"Laser Optoelectron. Progress"},{"issue":"12","key":"5138_CR34","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/s10773-023-05509-3","volume":"62","author":"L Zhang","year":"2023","unstructured":"Zhang, L., Zhang, J.-H., Xin, X.-J., Huang, M., Li, C.-Y.: Semi-quantum designated verifier signature scheme. Int. J. Theor. Phys. 62(12), 254 (2023)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"5138_CR35","doi-asserted-by":"publisher","DOI":"10.1360\/SSPMA-2023-0426","volume":"54","author":"X Tan","year":"2024","unstructured":"Tan, X., Ye, T.: Semiquantum proxy blind signature based on quantum teleportation (in Chinese). Scientia Sinica Physica, Mechanica Astronomica 54(3), 230313 (2024)","journal-title":"Scientia Sinica Physica, Mechanica Astronomica"},{"issue":"1","key":"5138_CR36","doi-asserted-by":"publisher","DOI":"10.1360\/SSPMA-2024-0169","volume":"55","author":"X Tan","year":"2025","unstructured":"Tan, X., Gan, Z., Ye, T.: Semiquantum group proxy blind signature (in Chinese). Scientia Sinica Physica, Mechanica Astronomica 55(1), 210311 (2025)","journal-title":"Scientia Sinica Physica, Mechanica Astronomica"},{"issue":"10","key":"5138_CR37","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1103\/PhysRev.47.777","volume":"47","author":"A Einstein","year":"1935","unstructured":"Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47(10), 777 (1935)","journal-title":"Phys. Rev."},{"issue":"18","key":"5138_CR38","doi-asserted-by":"publisher","first-page":"3891","DOI":"10.1103\/PhysRevLett.80.3891","volume":"80","author":"J-W Pan","year":"1998","unstructured":"Pan, J.-W., Bouwmeester, D., Weinfurter, H., Zeilinger, A.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80(18), 3891 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"5138_CR39","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of International Conference on Computers, Systems and Signal Processing, 175\u2013179. IEEE, Bangalore, India (1984)"},{"issue":"5410","key":"5138_CR40","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"2","key":"5138_CR41","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05138-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05138-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05138-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:18:44Z","timestamp":1774603124000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05138-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,27]]},"references-count":41,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5138"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05138-9","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,27]]},"assertion":[{"value":"20 June 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"116"}}