{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T07:34:31Z","timestamp":1774510471378,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T00:00:00Z","timestamp":1774483200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172182"],"award-info":[{"award-number":["62172182"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012269","name":"Science and Technology Innovative Research Team in Higher Educational Institutions of Hunan Province","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012269","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"Hunan Provincial Natural Science Foundation","doi-asserted-by":"crossref","award":["2025JJ70445"],"award-info":[{"award-number":["2025JJ70445"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05139-8","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:38:14Z","timestamp":1774503494000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A novel offline electronic cash system utilizing quantum teleportation and quantum proxy blind signatures"],"prefix":"10.1007","volume":"25","author":[{"given":"Rongbo","family":"Lu","sequence":"first","affiliation":[]},{"given":"Lu","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Juxiu","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,26]]},"reference":[{"key":"5139_CR1","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology: Proceedings of Crypto 82, pp. 199\u2013203. Springer (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"5139_CR2","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Online cash checks. In: Advances in Cryptology-EUROCRYPT\u201989: Workshop on the Theory and Application of Cryptographic Techniques Houthalen, Belgium, April 10\u201313, 1989 Proceedings 8, pp. 288\u2013293. Springer (1990)","DOI":"10.1007\/3-540-46885-4_30"},{"key":"5139_CR3","doi-asserted-by":"crossref","unstructured":"Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Advances in Cryptology-CRYPTO\u201988: Proceedings 8, pp. 319\u2013327. Springer (1990)","DOI":"10.1007\/0-387-34799-2_25"},{"issue":"4","key":"5139_CR4","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1093\/comjnl\/bxq078","volume":"54","author":"Z Tan","year":"2011","unstructured":"Tan, Z.: An off-line electronic cash scheme based on proxy blind signature. Comput. J. 54(4), 505\u2013512 (2011)","journal-title":"Comput. J."},{"issue":"2","key":"5139_CR5","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"5139_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"5139_CR7","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv preprint quant-ph\/0105032 (2001)"},{"issue":"8","key":"5139_CR8","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/s11433-008-0062-1","volume":"51","author":"Y Yang","year":"2008","unstructured":"Yang, Y., Wen, Q.: Threshold proxy quantum signature scheme with threshold shared verification. Sci. China, Ser. G 51(8), 1079\u20131088 (2008)","journal-title":"Sci. China, Ser. G"},{"key":"5139_CR9","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1007\/s11433-011-4457-z","volume":"54","author":"J Zhou","year":"2011","unstructured":"Zhou, J., Zhou, Y., Niu, X., Yang, Y.: Quantum proxy signature scheme with public verifiability. Sci. China Phys. Mech. Astron. 54, 1828\u20131832 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"2","key":"5139_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10773-024-05595-x","volume":"63","author":"L Lan","year":"2024","unstructured":"Lan, L., Lu, R., Zhong, J., Shi, Y.: A secure quantum proxy group signature scheme based on three-qubit entangled states. Int. J. Theoret. Phys. 63(2), 59 (2024)","journal-title":"Int. J. Theoret. Phys."},{"issue":"4","key":"5139_CR11","doi-asserted-by":"publisher","first-page":"666","DOI":"10.1016\/j.optcom.2008.10.025","volume":"282","author":"X Wen","year":"2009","unstructured":"Wen, X., Niu, X., Ji, L., Tian, Y.: A weak blind signature scheme based on quantum cryptography. Optics Commun. 282(4), 666\u2013669 (2009)","journal-title":"Optics Commun."},{"key":"5139_CR12","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s11128-013-0529-5","volume":"13","author":"S Khodambashi","year":"2014","unstructured":"Khodambashi, S., Zakerolhosseini, A.: A sessional blind signature based on quantum cryptography. Quantum Inf. Process. 13, 121\u2013130 (2014)","journal-title":"Quantum Inf. Process."},{"key":"5139_CR13","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1007\/s10773-018-3787-2","volume":"57","author":"X Guo","year":"2018","unstructured":"Guo, X., Zhang, J.-Z., Xie, S.-C.: A trusted third-party e-payment protocol based on quantum blind signature without entanglement. Int. J. Theoret. Phys. 57, 2657\u20132664 (2018)","journal-title":"Int. J. Theoret. Phys."},{"issue":"07","key":"5139_CR14","doi-asserted-by":"publisher","first-page":"2150040","DOI":"10.1142\/S0217732321500401","volume":"36","author":"X-L Gou","year":"2021","unstructured":"Gou, X.-L., Shi, R.-H., Shi, Z., Li, K.-C.: An improved e-payment protocol based on quantum blind signature without entanglement. Mod. Phys. Lett. A 36(07), 2150040 (2021)","journal-title":"Mod. Phys. Lett. A"},{"key":"5139_CR15","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s11128-012-0398-3","volume":"12","author":"X Wen","year":"2013","unstructured":"Wen, X., Chen, Y., Fang, J.: An inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12, 549\u2013558 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"5139_CR16","doi-asserted-by":"publisher","first-page":"1651","DOI":"10.1007\/s11128-012-0477-5","volume":"12","author":"XQ Cai","year":"2013","unstructured":"Cai, X.Q., Wei, C.Y.: Cryptanalysis of an inter-bank e-payment protocol based on quantum proxy blind signature. Quantum Inf. Process. 12(4), 1651\u20131657 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"5139_CR17","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/s10773-013-1826-6","volume":"53","author":"H-J Cao","year":"2014","unstructured":"Cao, H.-J., Zhu, Y.-Y., Li, P.-F.: A quantum proxy weak blind signature scheme. Int. J. Theoret. Phys. 53(2), 419\u2013425 (2014)","journal-title":"Int. J. Theoret. Phys."},{"key":"5139_CR18","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1007\/s10773-014-2250-2","volume":"54","author":"K-J Zhang","year":"2015","unstructured":"Zhang, K.-J., Jia, H.-Y.: Cryptanalysis of a quantum proxy weak blind signature scheme. Int. J. Theoret. Phys. 54, 582\u2013588 (2015)","journal-title":"Int. J. Theoret. Phys."},{"key":"5139_CR19","doi-asserted-by":"publisher","first-page":"2563","DOI":"10.1007\/s10773-018-3778-3","volume":"57","author":"X-F Niu","year":"2018","unstructured":"Niu, X.-F., Zhang, J.-Z., Xie, S.-C., Chen, B.-Q.: A third-party e-payment protocol based on quantum multi-proxy blind signature. Int. J. Theoret. Phys. 57, 2563\u20132573 (2018)","journal-title":"Int. J. Theoret. Phys."},{"key":"5139_CR20","doi-asserted-by":"publisher","first-page":"3510","DOI":"10.1007\/s10773-019-04217-1","volume":"58","author":"K Tiliwalidi","year":"2019","unstructured":"Tiliwalidi, K., Zhang, J.-Z., Xie, S.-C.: A multi-bank e-payment protocol based on quantum proxy blind signature. Int. J. Theoret. Phys. 58, 3510\u20133520 (2019)","journal-title":"Int. J. Theoret. Phys."},{"key":"5139_CR21","doi-asserted-by":"publisher","first-page":"1999","DOI":"10.1007\/s10773-019-04093-9","volume":"58","author":"G Liu","year":"2019","unstructured":"Liu, G., Ma, W.-P., Cao, H., Lyu, L.-D.: A novel quantum group proxy blind signature scheme based on five-qubit entangled state. Int. J. Theoret. Phys. 58, 1999\u20132008 (2019)","journal-title":"Int. J. Theoret. Phys."},{"issue":"10","key":"5139_CR22","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.3390\/e24101421","volume":"24","author":"Q Luo","year":"2022","unstructured":"Luo, Q., Zhang, T., Huang, X., Jing, N.: Two quantum proxy blind signature schemes based on controlled quantum teleportation. Entropy 24(10), 1421 (2022)","journal-title":"Entropy"},{"issue":"13","key":"5139_CR23","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"7415","key":"5139_CR24","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1038\/nature11472","volume":"489","author":"X-S Ma","year":"2012","unstructured":"Ma, X.-S., Herbst, T., Scheidl, T., Wang, D., Kropatschek, S., Naylor, W., Wittmann, B., Mech, A., Kofler, J., Anisimova, E., et al.: Quantum teleportation over 143 kilometres using active feed-forward. Nature 489(7415), 269\u2013273 (2012)","journal-title":"Nature"},{"key":"5139_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-2586-x","volume":"19","author":"S Rajiuddin","year":"2020","unstructured":"Rajiuddin, S., Baishya, A., Behera, B.K., Panigrahi, P.K.: Experimental realization of quantum teleportation of an arbitrary two-qubit state using a four-qubit cluster state. Quantum Inf. Process. 19, 1\u201313 (2020)","journal-title":"Quantum Inf. Process."},{"key":"5139_CR26","doi-asserted-by":"crossref","unstructured":"Ikeda, K.: qbitcoin: A peer-to-peer quantum cash system. In: Intelligent Computing: Proceedings of the 2018 Computing Conference, Vol. 1, pp. 763\u2013771. Springer (2019)","DOI":"10.1007\/978-3-030-01174-1_58"},{"key":"5139_CR27","doi-asserted-by":"crossref","unstructured":"Gupta, A., Chandra, G.V., Das, N., Paul, G.: An efficient and secure quantum blind signature-based electronic cash transaction scheme. IET Quantum Communication (2024)","DOI":"10.1049\/qtc2.12109"},{"issue":"5","key":"5139_CR28","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1088\/1009-1963\/14\/5\/006","volume":"14","author":"G Ting","year":"2005","unstructured":"Ting, G., Feng-Li, Y., Zhi-Xi, W.: Controlled quantum teleportation and secure direct communication. Chin. Phys. 14(5), 893 (2005)","journal-title":"Chin. Phys."},{"issue":"4","key":"5139_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05139-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05139-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05139-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T05:38:23Z","timestamp":1774503503000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05139-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,26]]},"references-count":29,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5139"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05139-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,26]]},"assertion":[{"value":"17 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"The authors all agreed to the publication.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"111"}}