{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T21:02:49Z","timestamp":1774645369625,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T00:00:00Z","timestamp":1367971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Theor Phys"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1007\/s10773-013-1626-z","type":"journal-article","created":{"date-parts":[[2013,5,7]],"date-time":"2013-05-07T05:45:13Z","timestamp":1367905513000},"page":"3295-3305","source":"Crossref","is-referenced-by-count":18,"title":["Security Analyses and Improvement of Arbitrated Quantum Signature with an Untrusted Arbitrator"],"prefix":"10.1007","volume":"52","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,5,8]]},"reference":[{"key":"1626_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"The 35th Annual Symposium on Proceedings of Foundations of Computer Science","author":"P.W. Shor","year":"1994","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: The 35th Annual Symposium on Proceedings of Foundations of Computer Science, 1994, pp. 124\u2013134. IEEE, New York (1994)"},{"key":"1626_CR2","first-page":"175","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"6","key":"1626_CR3","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"1626_CR4","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"5410","key":"1626_CR5","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.K. Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"2","key":"1626_CR6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1626_CR7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D. Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48(3), 351\u2013406 (2001)","journal-title":"J. ACM"},{"issue":"1","key":"1626_CR8","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"3","key":"1626_CR9","first-page":"599","volume":"41","author":"H. Inamori","year":"2007","unstructured":"Inamori, H., L\u00fctkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J., D, At. Mol. Opt. Plasma Phys. 41(3), 599\u2013627 (2007)","journal-title":"Eur. Phys. J., D, At. Mol. Opt. Plasma Phys."},{"key":"1626_CR10","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph\/0105032 (2001)"},{"key":"1626_CR11","first-page":"449","volume-title":"The 43rd Annual IEEE Symposium on Foundations of Computer Science","author":"H. Barnum","year":"2002","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002, pp. 449\u2013458. IEEE, New York (2002)"},{"issue":"2","key":"1626_CR12","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.66.022301","volume":"66","author":"M. Curty","year":"2002","unstructured":"Curty, M., Santos, D.J., P\u00e9rez, E., Garc\u00eda-Fern\u00e1ndez, P.: Qubit authentication. Phys. Rev. A 66(2), 022301 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1626_CR13","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G. Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1626_CR14","volume":"79","author":"Q. Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1626_CR15","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H. Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"key":"1626_CR16","first-page":"514","volume-title":"The 7th International Conference on Advanced Communication Technology, 2005 (ICACT 2005)","author":"X. Lu","year":"2004","unstructured":"Lu, X., Feng, D.: Quantum digital signature based on quantum one-way functions. In: The 7th International Conference on Advanced Communication Technology, 2005 (ICACT 2005), vol.\u00a01, pp. 514\u2013517. IEEE, New York (2004)"},{"key":"1626_CR17","first-page":"1375","volume-title":"The 8th International Conference on Advanced Communication Technology, 2006 (ICACT 2006)","author":"J. Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with message recovery. In: The 8th International Conference on Advanced Communication Technology, 2006 (ICACT 2006), vol.\u00a02, pp.\u00a01375\u20131378. IEEE, New York (2006)"},{"issue":"3","key":"1626_CR18","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/BF03033549","volume":"2","author":"J. Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with single photons. Optoelectron. Lett. 2(3), 209\u2013212 (2006)","journal-title":"Optoelectron. Lett."},{"issue":"3\/4","key":"1626_CR19","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1515\/zna-2007-3-405","volume":"62","author":"X. Wen","year":"2007","unstructured":"Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. A 62(3\/4), 147 (2007)","journal-title":"Z. Naturforsch. A"},{"issue":"4","key":"1626_CR20","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1142\/S0219749907003031","volume":"5","author":"G. Zeng","year":"2007","unstructured":"Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(4), 553\u2013573 (2007)","journal-title":"Int. J. Quantum Inf."},{"key":"1626_CR21","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1088\/1674-1056\/17\/2\/011","volume":"17","author":"Y.G. Yang","year":"2008","unstructured":"Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys.\u00a0B 17, 415 (2008)","journal-title":"Chin. Phys.\u00a0B"},{"key":"1626_CR22","first-page":"1054","volume-title":"Computational and Information Science","author":"X. L\u00fc","year":"2005","unstructured":"L\u00fc, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Computational and Information Science, pp.\u00a01054\u20131060 (2005)"},{"key":"1626_CR23","doi-asserted-by":"crossref","first-page":"1574","DOI":"10.1109\/ITNG.2009.38","volume-title":"The Sixth International Conference on Information Technology: New Generations, 2009 (ITNG\u201909)","author":"Z. Cao","year":"2009","unstructured":"Cao, Z., Markowitch, O.: Security analysis of one quantum digital signature scheme. In: The Sixth International Conference on Information Technology: New Generations, 2009 (ITNG\u201909), pp. 1574\u20131576. IEEE, New York (2009)"},{"issue":"4","key":"1626_CR24","volume":"82","author":"X. Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1626_CR25","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.77.046301","volume":"77","author":"M. Curty","year":"2008","unstructured":"Curty, M., L\u00fctkenhaus, N.: Comment on \u201cArbitrated quantum-signature scheme\u201d. Phys. Rev. A 77(4), 046301 (2008)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1626_CR26","volume":"78","author":"G. Zeng","year":"2008","unstructured":"Zeng, G.: Reply to \u201cComment on \u2018Arbitrated quantum-signature scheme\u2019\u2019\u2019. Phys. Rev. A 78(1), 016301 (2008)","journal-title":"Phys. Rev. A"},{"key":"1626_CR27","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going beyond Bell\u2019s theorem. arXiv:0712.0921 (2007)"},{"key":"1626_CR28","first-page":"23","volume-title":"Quantum Control and Measurement","author":"D.M. Greenberger","year":"1993","unstructured":"Greenberger, D.M., Bernstein, H.J., Horne, M.A., Shimony, A., Zeilinger, A.: Proposed GHZ experiments using cascades of down-conversions. In: Quantum Control and Measurement, vol.\u00a01, p.\u00a023 (1993)"},{"issue":"4","key":"1626_CR29","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"P.O. Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1626_CR30","first-page":"266","volume-title":"Advances in Cryptology, 1990 (EUROCRYPT\u201990)","author":"I. Ingemarsson","year":"2006","unstructured":"Ingemarsson, I., Simmons, G.: A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Advances in Cryptology, 1990 (EUROCRYPT\u201990), pp.\u00a0266\u2013282. Springer, Berlin (2006)"},{"issue":"6","key":"1626_CR31","doi-asserted-by":"crossref","first-page":"1205","DOI":"10.1142\/S0219749909005742","volume":"7","author":"Z. Cao","year":"2009","unstructured":"Cao, Z., Markowitch, O.: A note on an arbitrated quantum signature scheme. Int. J. Quantum Inf. 7(6), 1205\u20131209 (2009)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"1626_CR32","first-page":"773","volume":"61","author":"Y.G. Yang","year":"2011","unstructured":"Yang, Y.G., Zhou, Z., Teng, Y.W., Wen, Q.Y.: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J., D, At. Mol. Opt. Plasma Phys. 61(3), 773\u2013778 (2011)","journal-title":"Eur. Phys. J., D, At. Mol. Opt. Plasma Phys."}],"container-title":["International Journal of Theoretical Physics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10773-013-1626-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10773-013-1626-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10773-013-1626-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T06:04:28Z","timestamp":1644991468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10773-013-1626-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5,8]]},"references-count":32,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["1626"],"URL":"https:\/\/doi.org\/10.1007\/s10773-013-1626-z","relation":{},"ISSN":["0020-7748","1572-9575"],"issn-type":[{"value":"0020-7748","type":"print"},{"value":"1572-9575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,5,8]]}}}