{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:02:49Z","timestamp":1774645369630,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642387555","type":"print"},{"value":"9783642387562","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38756-2_8","type":"book-chapter","created":{"date-parts":[[2013,5,21]],"date-time":"2013-05-21T00:43:48Z","timestamp":1369097028000},"page":"48-59","source":"Crossref","is-referenced-by-count":7,"title":["Arbitrated Quantum Signature Schemes: Attacks and Security"],"prefix":"10.1007","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ben-Or, M.: Fault-tolerant quantum computation with constant error. In: Proceedings of the twenty-ninth Annual ACM Symposium on Theory of Computing, pp. 176\u2013188. ACM (1997)","DOI":"10.1145\/258533.258579"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: Proceedings of the 43rd Annual Symposium on Foundations of Computer Science, pp. 449\u2013458. IEEE (2002)","DOI":"10.1109\/SFCS.2002.1181969"},{"issue":"21","key":"8_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"key":"8_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE (1984)"},{"issue":"3","key":"8_CR5","doi-asserted-by":"publisher","first-page":"32341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M. Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Physical Review A\u00a079(3), 032341 (2009)","journal-title":"Physical Review A"},{"issue":"14","key":"8_CR6","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M. Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Physical Review Letters\u00a099(14), 140501 (2007)","journal-title":"Physical Review Letters"},{"issue":"4","key":"8_CR7","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"P.O. Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Physical Review A 67(4), 042317 (2003)","journal-title":"Physical Review A"},{"issue":"26","key":"8_CR8","doi-asserted-by":"crossref","first-page":"5932","DOI":"10.1103\/PhysRevLett.81.5932","volume":"81","author":"H.J. Briegel","year":"1998","unstructured":"Briegel, H.J., D\u00fcr, W., Cirac, J.I., Zoller, P.: Quantum repeaters: The role of imperfect local operations in quantum communication. Physical Review Letters 81(26), 5932\u20135935 (1998)","journal-title":"Physical Review Letters"},{"issue":"16","key":"8_CR9","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H. Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Physical Review Letters\u00a087(16), 167902 (2001)","journal-title":"Physical Review Letters"},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q.Y. Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Physics Letters A\u00a0351(1), 23\u201325 (2006)","journal-title":"Physics Letters A"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. ArXiv:quant-ph\/1106.5318 (2011)","DOI":"10.1103\/PhysRevA.84.062330"},{"issue":"4","key":"8_CR12","doi-asserted-by":"crossref","first-page":"046301","DOI":"10.1103\/PhysRevA.77.046301","volume":"77","author":"M. Curty","year":"2008","unstructured":"Curty, M., L\u00fctkenhaus, N.: Comment on\u201cArbitrated quantum-signature scheme\u201d. Physical Review A 77(4), 046301 (2008)","journal-title":"Physical Review A"},{"issue":"2","key":"8_CR13","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.66.022301","volume":"66","author":"M. Curty","year":"2002","unstructured":"Curty, M., Santos, D.J., P\u00e9rez, E., Garc\u00eda-Fern\u00e1ndez, P.: Qubit authentication. Physical Review A 66(2), 022301 (2002)","journal-title":"Physical Review A"},{"key":"8_CR14","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against trojan horse attack. ArXiv:quant-ph\/0508168 (2005)"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/35106500","volume":"414","author":"L.M. Duan","year":"2001","unstructured":"Duan, L.M., Lukin, M.D., Cirac, J.I., Zoller, P.: Generation of nonclassical photon pairs for scalable quantum communication with atomic ensembles. Nature\u00a0414, 413 (2001)","journal-title":"Nature"},{"issue":"6","key":"8_CR16","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Physical Review Letters\u00a067(6), 661\u2013663 (1991)","journal-title":"Physical Review Letters"},{"issue":"2","key":"8_CR17","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F. Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Physical Review A\u00a084(2), 022344 (2011)","journal-title":"Physical Review A"},{"issue":"1","key":"8_CR18","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics\u00a074(1), 145\u2013195 (2002)","journal-title":"Reviews of Modern Physics"},{"issue":"5","key":"8_CR19","doi-asserted-by":"crossref","first-page":"056301","DOI":"10.1103\/PhysRevA.85.056301","volume":"85","author":"T. Hwang","year":"2012","unstructured":"Hwang, T., Luo, Y.P., Chong, S.K.: Comment on \u201cSecurity analysis and improvements of arbitrated quantum signature schemes\u201d. Physical Review A\u00a085(5), 056301 (2012)","journal-title":"Physical Review A"},{"issue":"3","key":"8_CR20","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1140\/epjd\/e2007-00010-4","volume":"41","author":"H. Inamori","year":"2007","unstructured":"Inamori, H., L\u00fctkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. The European Physical Journal D: Atomic, Molecular, Optical and Plasma Physics\u00a041(3), 599\u2013627 (2007)","journal-title":"The European Physical Journal D: Atomic, Molecular, Optical and Plasma Physics"},{"issue":"24","key":"8_CR21","doi-asserted-by":"publisher","first-page":"4337","DOI":"10.1103\/PhysRevLett.75.4337","volume":"75","author":"P.G. Kwiat","year":"1995","unstructured":"Kwiat, P.G., Mattle, K., Weinfurter, H., Zeilinger, A., Sergienko, A.V., Shih, Y.: New high-intensity source of polarization-entangled photon pairs. Physical Review Letters\u00a075(24), 4337\u20134341 (1995)","journal-title":"Physical Review Letters"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S.H., Smith, M.H., Trajkovic, L.: Distributed denial of service attacks. In: 2000 IEEE International Conference on Systems, Man, and Cybernetics, vol.\u00a03, pp. 2275\u20132280. IEEE (2000)","DOI":"10.1109\/ICSMC.2000.886455"},{"issue":"5","key":"8_CR23","doi-asserted-by":"crossref","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q. Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Physical Review A 79(5), 054307 (2009)","journal-title":"Physical Review A"},{"issue":"5410","key":"8_CR24","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.K. Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science\u00a0283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"3","key":"8_CR25","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D. Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. Journal of the ACM (JACM)\u00a048(3), 351\u2013406 (2001)","journal-title":"Journal of the ACM (JACM)"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Fault-tolerant quantum computation. In: Proceedings of the 37th Annual Symposium on Foundations of Computer Science, pp. 56\u201365. IEEE (1996)","DOI":"10.1109\/SFCS.1996.548464"},{"issue":"2","key":"8_CR27","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters\u00a085(2), 441\u2013444 (2000)","journal-title":"Physical Review Letters"},{"key":"8_CR28","unstructured":"Sun, Z., Du, R., Long, D.: Improving the security of arbitrated quantum signature protocols. ArXiv:quant-ph\/1107.2459 (2011)"},{"issue":"1","key":"8_CR29","doi-asserted-by":"crossref","first-page":"016301","DOI":"10.1103\/PhysRevA.78.016301","volume":"78","author":"G. Zeng","year":"2008","unstructured":"Zeng, G.: Reply to \u201cComment on \u2018Arbitrated quantum-signature scheme\u2019\u00a0\u201d. Physical Review A\u00a078(1), 016301 (2008)","journal-title":"Physical Review A"},{"issue":"4","key":"8_CR30","doi-asserted-by":"crossref","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G. Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Physical Review A 65(4), 042312 (2002)","journal-title":"Physical Review A"},{"issue":"4","key":"8_CR31","doi-asserted-by":"crossref","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X. Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Physical Review A 82(4), 042325 (2010)","journal-title":"Physical Review A"},{"issue":"5","key":"8_CR32","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X. Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Physical Review A 79(5), 052312 (2009)","journal-title":"Physical Review A"}],"container-title":["Lecture Notes in Computer Science","Frontiers in Algorithmics and Algorithmic Aspects in Information and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38756-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T10:42:50Z","timestamp":1746009770000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38756-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642387555","9783642387562"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38756-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}