{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T15:19:34Z","timestamp":1718896774084},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T00:00:00Z","timestamp":1381968000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int J Theor Phys"],"published-print":{"date-parts":[[2014,2]]},"DOI":"10.1007\/s10773-013-1846-2","type":"journal-article","created":{"date-parts":[[2013,10,16]],"date-time":"2013-10-16T04:40:06Z","timestamp":1381898406000},"page":"603-611","source":"Crossref","is-referenced-by-count":10,"title":["Security Problems in the Quantum Signature Scheme with a Weak Arbitrator"],"prefix":"10.1007","volume":"53","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Fang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,10,17]]},"reference":[{"key":"1846_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"Proceedings of the 35th Annual Symposium on Foundations of Computer Science","author":"P.W. Shor","year":"1994","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE Press, New York (1994)"},{"key":"1846_CR2","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures (2001). arXiv:quant-ph\/0105032"},{"key":"1846_CR3","first-page":"449","volume-title":"The 43rd Annual IEEE Symposium on Foundations of Computer Science","author":"H. Barnum","year":"2002","unstructured":"Barnum, H., Cr\u00e9peau, C., Gottesman, D., Smith, A., Tapp, A.: Authentication of quantum messages. In: The 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 449\u2013458. IEEE Press, New York (2002)"},{"issue":"2","key":"1846_CR4","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.66.022301","volume":"66","author":"M. Curty","year":"2002","unstructured":"Curty, M., Santos, D.J., P\u00e9rez, E., Garc\u00eda-Fern\u00e1ndez, P.: Qubit authentication. Phys. Rev. A 66(2), 022301 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1846_CR5","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G. Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1846_CR6","volume":"79","author":"Q. Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1846_CR7","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H. Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5), 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"key":"1846_CR8","first-page":"514","volume-title":"The 7th International Conference on Advanced Communication Technology (ICACT 2005)","author":"X. Lu","year":"2004","unstructured":"Lu, X., Feng, D.: Quantum digital signature based on quantum one-way functions. In: The 7th International Conference on Advanced Communication Technology (ICACT 2005), vol. 1, pp. 514\u2013517. IEEE Press, New York (2004)"},{"key":"1846_CR9","first-page":"1375","volume-title":"The 8th International Conference on Advanced Communication Technology (ICACT 2006)","author":"J. Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with message recovery. In: The 8th International Conference on Advanced Communication Technology (ICACT 2006), vol. 2, pp. 1375\u20131378. IEEE Press, New York (2006)"},{"issue":"3","key":"1846_CR10","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1007\/BF03033549","volume":"2","author":"J. Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.: Quantum signature scheme with single photons. Optoelectron. Lett. 2(3), 209\u2013212 (2006)","journal-title":"Optoelectron. Lett."},{"issue":"3\/4","key":"1846_CR11","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1515\/zna-2007-3-405","volume":"62a","author":"X. Wen","year":"2007","unstructured":"Wen, X., Liu, Y., Sun, Y.: Quantum multi-signature protocol based on teleportation. Z. Naturforsch. 62a(3\/4), 147\u2013151 (2007)","journal-title":"Z. Naturforsch."},{"issue":"4","key":"1846_CR12","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1142\/S0219749907003031","volume":"5","author":"G. Zeng","year":"2007","unstructured":"Zeng, G., Lee, M., Guo, Y., He, G.: Continuous variable quantum signature algorithm. Int. J. Quantum Inf. 5(4), 553\u2013573 (2007)","journal-title":"Int. J. Quantum Inf."},{"key":"1846_CR13","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1088\/1674-1056\/17\/2\/011","volume":"17","author":"Y.G. Yang","year":"2008","unstructured":"Yang, Y.G.: Multi-proxy quantum group signature scheme with threshold shared verification. Chin. Phys. B 17, 415 (2008)","journal-title":"Chin. Phys. B"},{"key":"1846_CR14","first-page":"1054","volume-title":"Computational and Information Science","author":"X. L\u00fc","year":"2005","unstructured":"L\u00fc, X., Feng, D.G.: An arbitrated quantum message signature scheme. In: Computational and Information Science, pp. 1054\u20131060 (2005)"},{"key":"1846_CR15","first-page":"1574","volume-title":"The 6th International Conference on Information Technology: New Generetions (ITNG\u201909)","author":"Z. Cao","year":"2009","unstructured":"Cao, Z., Markowitch, O.: Security analysis of one quantum digital signature scheme. In: The 6th International Conference on Information Technology: New Generetions (ITNG\u201909), pp. 1574\u20131576. IEEE Press, New York (2009)"},{"issue":"4","key":"1846_CR16","volume":"82","author":"X. Zou","year":"2010","unstructured":"Zou, X., Qiu, D.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82(4), 042325 (2010)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1846_CR17","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.77.046301","volume":"77","author":"M. Curty","year":"2008","unstructured":"Curty, M., L\u00fctkenhaus, N.: Comment on \u201carbitrated quantum-signature scheme\u201d. Phys. Rev. A 77(4), 046301 (2008)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1846_CR18","volume":"78","author":"G. Zeng","year":"2008","unstructured":"Zeng, G.: Reply to \u201cComment on \u2018Arbitrated quantum-signature scheme\u2019\u2009\u201d. Phys. Rev. A 78(1), 016301 (2008)","journal-title":"Phys. Rev. A"},{"key":"1846_CR19","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going beyond Bell\u2019s theorem (2007). arXiv:0712.0921"},{"key":"1846_CR20","first-page":"23","volume":"1","author":"D.M. Greenberger","year":"1993","unstructured":"Greenberger, D.M., Bernstein, H.J., Horne, M.A., Shimony, A., Zeilinger, A.: Proposed GHZ experiments using cascades of down-conversions. Quantum Control Meas. 1, 23 (1993)","journal-title":"Quantum Control Meas."},{"issue":"4","key":"1846_CR21","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"P.O. Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1846_CR22","doi-asserted-by":"crossref","first-page":"2135","DOI":"10.1007\/s10773-012-1093-y","volume":"51","author":"M.X. Luo","year":"2012","unstructured":"Luo, M.X., Chen, X.B., Yun, D., Yang, Y.X.: Quantum signature scheme with weak arbitrator. Int. J. Theor. Phys. 51, 2135\u20132142 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"16","key":"1846_CR23","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H. Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 167902 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1846_CR24","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.72.012315","volume":"72","author":"G.Y. Xiang","year":"2005","unstructured":"Xiang, G.Y., Li, J., Yu, B., Guo, G.C.: Remote preparation of mixed states via noisy entanglement. Phys. Rev. A 72(1), 012315 (2005)","journal-title":"Phys. Rev. A"}],"container-title":["International Journal of Theoretical Physics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10773-013-1846-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10773-013-1846-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10773-013-1846-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T05:58:45Z","timestamp":1646805525000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10773-013-1846-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10,17]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["1846"],"URL":"https:\/\/doi.org\/10.1007\/s10773-013-1846-2","relation":{},"ISSN":["0020-7748","1572-9575"],"issn-type":[{"value":"0020-7748","type":"print"},{"value":"1572-9575","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,10,17]]}}}