{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:13Z","timestamp":1750220233961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,23]]},"DOI":"10.1145\/3546000.3546012","type":"proceedings-article","created":{"date-parts":[[2022,8,19]],"date-time":"2022-08-19T16:08:37Z","timestamp":1660925317000},"page":"77-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Quantum Group Signature Based on Quantum Walk in d Dimensions"],"prefix":"10.1145","author":[{"given":"Yunxiao","family":"Qian","sequence":"first","affiliation":[{"name":"School of Software Engineering, University of Science and Technology of China, China"}]},{"given":"Haoyang","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Sofrware Engineering, University of Science and Technology of China, China"}]}],"member":"320","published-online":{"date-parts":[[2022,8,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Quantum digital signatures.\u00a0 arXiv preprint quant-ph\/0105032","author":"Gottesman D.","year":"2001","unstructured":"Gottesman , D. , & Chuang , I. ( 2001 ). Quantum digital signatures.\u00a0 arXiv preprint quant-ph\/0105032 . Gottesman, D., & Chuang, I. (2001). Quantum digital signatures.\u00a0 arXiv preprint quant-ph\/0105032."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181969"},{"key":"e_1_3_2_1_3_1","volume-title":"Arbitrated quantum-signature scheme.\u00a0 Physical review A,\u00a065 (4), 042312","author":"Zeng G.","year":"2002","unstructured":"Zeng , G. , & Keitel , C. H. ( 2002 ). Arbitrated quantum-signature scheme.\u00a0 Physical review A,\u00a065 (4), 042312 . Zeng, G., & Keitel, C. H. (2002). Arbitrated quantum-signature scheme.\u00a0 Physical review A,\u00a065 (4), 042312."},{"key":"e_1_3_2_1_4_1","volume-title":"Security analysis and improvements of arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a082 (4), 042325","author":"Zou X.","year":"2010","unstructured":"Zou , X. , & Qiu , D. ( 2010 ). Security analysis and improvements of arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a082 (4), 042325 . Zou, X., & Qiu, D. (2010). Security analysis and improvements of arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a082 (4), 042325."},{"key":"e_1_3_2_1_5_1","volume-title":"Security problem on arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a084 (6), 062330","author":"Choi J. W.","year":"2011","unstructured":"Choi , J. W. , Chang , K. Y. , & Hong , D. ( 2011 ). Security problem on arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a084 (6), 062330 . Choi, J. W., Chang, K. Y., & Hong, D. (2011). Security problem on arbitrated quantum signature schemes.\u00a0 Physical Review A,\u00a084 (6), 062330."},{"key":"e_1_3_2_1_6_1","volume-title":"In\u00a0 Workshop on the Theory and Application of of Cryptographic Techniques\u00a0(pp. 257-265)","author":"Chaum D.","year":"1991","unstructured":"Chaum , D. , & Heyst , E. V. ( 1991 , April). Group signatures . In\u00a0 Workshop on the Theory and Application of of Cryptographic Techniques\u00a0(pp. 257-265) . Springer, Berlin, Heidelberg. Chaum, D., & Heyst, E. V. (1991, April). Group signatures. In\u00a0 Workshop on the Theory and Application of of Cryptographic Techniques\u00a0(pp. 257-265). Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_7_1","volume-title":"A group signature scheme based on quantum teleportation.\u00a0 Physica Scripta,\u00a081 (5), 055001","author":"Wen X.","year":"2010","unstructured":"Wen , X. , Tian , Y. , Ji , L. , & Niu , X. ( 2010 ). A group signature scheme based on quantum teleportation.\u00a0 Physica Scripta,\u00a081 (5), 055001 . Wen, X., Tian, Y., Ji, L., & Niu, X. (2010). A group signature scheme based on quantum teleportation.\u00a0 Physica Scripta,\u00a081 (5), 055001."},{"key":"e_1_3_2_1_8_1","volume-title":"Quantum group blind signature scheme without entanglement.\u00a0 Optics Communications,\u00a0284 (14), 3654-3658","author":"Xu R.","year":"2011","unstructured":"Xu , R. , Huang , L. , Yang , W. , & He , L. ( 2011 ). Quantum group blind signature scheme without entanglement.\u00a0 Optics Communications,\u00a0284 (14), 3654-3658 . Xu, R., Huang, L., Yang, W., & He, L. (2011). Quantum group blind signature scheme without entanglement.\u00a0 Optics Communications,\u00a0284 (14), 3654-3658."},{"key":"e_1_3_2_1_9_1","volume-title":"Cryptanalysis of the quantum group signature protocols.\u00a0 International Journal of Theoretical Physics,\u00a052 (11), 4163-4173","author":"Zhang K. J.","year":"2013","unstructured":"Zhang , K. J. , Sun , Y. , Song , T. T. , & Zuo , H. J. ( 2013 ). Cryptanalysis of the quantum group signature protocols.\u00a0 International Journal of Theoretical Physics,\u00a052 (11), 4163-4173 . Zhang, K. J., Sun, Y., Song, T. T., & Zuo, H. J. (2013). Cryptanalysis of the quantum group signature protocols.\u00a0 International Journal of Theoretical Physics,\u00a052 (11), 4163-4173."},{"key":"e_1_3_2_1_10_1","volume-title":"Improved group signature scheme based on quantum teleportation.\u00a0 International Journal of Theoretical Physics,\u00a053 (4), 1208-1216","author":"Su Q.","year":"2014","unstructured":"Su , Q. , & Li , W. M. ( 2014 ). Improved group signature scheme based on quantum teleportation.\u00a0 International Journal of Theoretical Physics,\u00a053 (4), 1208-1216 . Su, Q., & Li, W. M. (2014). Improved group signature scheme based on quantum teleportation.\u00a0 International Journal of Theoretical Physics,\u00a053 (4), 1208-1216."},{"key":"e_1_3_2_1_11_1","volume-title":"A secure quantum group signature scheme based on Bell states.\u00a0 Physica Scripta,\u00a087 (4), 045012","author":"Zhang K.","year":"2013","unstructured":"Zhang , K. , Song , T. , Zuo , H. , & Zhang , W. ( 2013 ). A secure quantum group signature scheme based on Bell states.\u00a0 Physica Scripta,\u00a087 (4), 045012 . Zhang, K., Song, T., Zuo, H., & Zhang, W. (2013). A secure quantum group signature scheme based on Bell states.\u00a0 Physica Scripta,\u00a087 (4), 045012."},{"key":"e_1_3_2_1_12_1","volume-title":"A novel quantum group signature scheme without using entangled states.\u00a0 Quantum Information Processing,\u00a014 (7), 2577-2587","author":"Xu G. B.","year":"2015","unstructured":"Xu , G. B. , & Zhang , K. J. ( 2015 ). A novel quantum group signature scheme without using entangled states.\u00a0 Quantum Information Processing,\u00a014 (7), 2577-2587 . Xu, G. B., & Zhang, K. J. (2015). A novel quantum group signature scheme without using entangled states.\u00a0 Quantum Information Processing,\u00a014 (7), 2577-2587."},{"key":"e_1_3_2_1_13_1","volume-title":"Generalized teleportation by quantum walks.\u00a0 Quantum Information Processing,\u00a016 (9), 1-13","author":"Wang Y.","year":"2017","unstructured":"Wang , Y. , Shang , Y. , & Xue , P. ( 2017 ). Generalized teleportation by quantum walks.\u00a0 Quantum Information Processing,\u00a016 (9), 1-13 . Wang, Y., Shang, Y., & Xue, P. (2017). Generalized teleportation by quantum walks.\u00a0 Quantum Information Processing,\u00a016 (9), 1-13."},{"key":"e_1_3_2_1_14_1","volume-title":"Quantum communication protocols by quantum walks with two coins.\u00a0 EPL (Europhysics Letters),\u00a0124 (6), 60009","author":"Shang Y.","year":"2019","unstructured":"Shang , Y. , Wang , Y. , Li , M. , & Lu , R. ( 2019 ). Quantum communication protocols by quantum walks with two coins.\u00a0 EPL (Europhysics Letters),\u00a0124 (6), 60009 . Shang, Y., Wang, Y., Li, M., & Lu, R. (2019). Quantum communication protocols by quantum walks with two coins.\u00a0 EPL (Europhysics Letters),\u00a0124 (6), 60009."},{"key":"e_1_3_2_1_15_1","volume-title":"Arbitrated quantum signature scheme with quantum walk-based teleportation.\u00a0 Quantum Information Processing,\u00a018 (5), 1-21","author":"Feng Y.","year":"2019","unstructured":"Feng , Y. , Shi , R. , Shi , J. , Zhou , J. , & Guo , Y. ( 2019 ). Arbitrated quantum signature scheme with quantum walk-based teleportation.\u00a0 Quantum Information Processing,\u00a018 (5), 1-21 . Feng, Y., Shi, R., Shi, J., Zhou, J., & Guo, Y. (2019). Arbitrated quantum signature scheme with quantum walk-based teleportation.\u00a0 Quantum Information Processing,\u00a018 (5), 1-21."},{"key":"e_1_3_2_1_16_1","volume-title":"Quantum blind signature scheme based on quantum walk.\u00a0 International Journal of Theoretical Physics,\u00a059 (7)","author":"Li X. Y.","year":"2020","unstructured":"Li , X. Y. , Chang , Y. , Zhang , S. B. , Dai , J. Q. , & Zheng , T. ( 2020 ). Quantum blind signature scheme based on quantum walk.\u00a0 International Journal of Theoretical Physics,\u00a059 (7) , 2059-2073. Li, X. Y., Chang, Y., Zhang, S. B., Dai, J. Q., & Zheng, T. (2020). Quantum blind signature scheme based on quantum walk.\u00a0 International Journal of Theoretical Physics,\u00a059 (7), 2059-2073."},{"key":"e_1_3_2_1_17_1","volume-title":"Semi-quantum proxy signature scheme with quantum walk-based teleportation.\u00a0 International Journal of Theoretical Physics,\u00a059 (10), 3145-3155","author":"Zheng T.","year":"2020","unstructured":"Zheng , T. , Chang , Y. , Yan , L. , & Zhang , S. B. ( 2020 ). Semi-quantum proxy signature scheme with quantum walk-based teleportation.\u00a0 International Journal of Theoretical Physics,\u00a059 (10), 3145-3155 . Zheng, T., Chang, Y., Yan, L., & Zhang, S. B. (2020). Semi-quantum proxy signature scheme with quantum walk-based teleportation.\u00a0 International Journal of Theoretical Physics,\u00a059 (10), 3145-3155."},{"key":"e_1_3_2_1_18_1","volume-title":"A new kind of flexible quantum teleportation of an arbitrary multi-qubit state by multi-walker quantum walks.\u00a0 Quantum Information Processing,\u00a018 (9), 1-16","author":"Li H. J.","year":"2019","unstructured":"Li , H. J. , Chen , X. B. , Wang , Y. L. , Hou , Y. Y. , & Li , J. ( 2019 ). A new kind of flexible quantum teleportation of an arbitrary multi-qubit state by multi-walker quantum walks.\u00a0 Quantum Information Processing,\u00a018 (9), 1-16 . Li, H. J., Chen, X. B., Wang, Y. L., Hou, Y. Y., & Li, J. (2019). A new kind of flexible quantum teleportation of an arbitrary multi-qubit state by multi-walker quantum walks.\u00a0 Quantum Information Processing,\u00a018 (9), 1-16."},{"key":"e_1_3_2_1_19_1","volume-title":"Quantum walks driven by many coins.\u00a0 Physical Review A,\u00a067 (5), 052317","author":"Brun T. A.","year":"2003","unstructured":"Brun , T. A. , Carteret , H. A. , & Ambainis , A. ( 2003 ). Quantum walks driven by many coins.\u00a0 Physical Review A,\u00a067 (5), 052317 . Brun, T. A., Carteret, H. A., & Ambainis, A. (2003). Quantum walks driven by many coins.\u00a0 Physical Review A,\u00a067 (5), 052317."},{"key":"e_1_3_2_1_20_1","volume-title":"Optimal encryption of quantum bits.\u00a0 Physical review A,\u00a067 (4), 042317","author":"Boykin P. O.","year":"2003","unstructured":"Boykin , P. O. , & Roychowdhury , V. ( 2003 ). Optimal encryption of quantum bits.\u00a0 Physical review A,\u00a067 (4), 042317 . Boykin, P. O., & Roychowdhury, V. (2003). Optimal encryption of quantum bits.\u00a0 Physical review A,\u00a067 (4), 042317."},{"key":"e_1_3_2_1_21_1","volume-title":"Improving the security of arbitrated quantum signature against the forgery attack.\u00a0 Quantum information processing,\u00a012 (8), 2655-2669","author":"Zhang K. J.","year":"2013","unstructured":"Zhang , K. J. , Zhang , W. W. , & Li , D. ( 2013 ). Improving the security of arbitrated quantum signature against the forgery attack.\u00a0 Quantum information processing,\u00a012 (8), 2655-2669 . Zhang, K. J., Zhang, W. W., & Li, D. (2013). Improving the security of arbitrated quantum signature against the forgery attack.\u00a0 Quantum information processing,\u00a012 (8), 2655-2669."},{"key":"e_1_3_2_1_22_1","volume-title":"Reexamination of arbitrated quantum signature: the impossible and the possible.\u00a0 Quantum information processing,\u00a012 (9), 3127-3141","author":"Zhang K. J.","year":"2013","unstructured":"Zhang , K. J. , Qin , S. J. , Sun , Y. , Song , T. T. , & Su , Q. ( 2013 ). Reexamination of arbitrated quantum signature: the impossible and the possible.\u00a0 Quantum information processing,\u00a012 (9), 3127-3141 . Zhang, K. J., Qin, S. J., Sun, Y., Song, T. T., & Su, Q. (2013). Reexamination of arbitrated quantum signature: the impossible and the possible.\u00a0 Quantum information processing,\u00a012 (9), 3127-3141."},{"key":"e_1_3_2_1_23_1","volume-title":"An arbitrated quantum signature protocol based on the chained CNOT operations encryption.\u00a0 Quantum Information Processing,\u00a014 (6), 2171-2181","author":"Li F. G.","year":"2015","unstructured":"Li , F. G. , & Shi , J. H. ( 2015 ). An arbitrated quantum signature protocol based on the chained CNOT operations encryption.\u00a0 Quantum Information Processing,\u00a014 (6), 2171-2181 . Li, F. G., & Shi, J. H. (2015). An arbitrated quantum signature protocol based on the chained CNOT operations encryption.\u00a0 Quantum Information Processing,\u00a014 (6), 2171-2181."},{"key":"e_1_3_2_1_24_1","volume-title":"In\u00a0 NASA International Conference on Quantum Computing and Quantum Communications\u00a0(pp. 302-313)","author":"Gottesman D.","year":"1998","unstructured":"Gottesman , D. ( 1998 , February). Fault-tolerant quantum computation with higher-dimensional systems . In\u00a0 NASA International Conference on Quantum Computing and Quantum Communications\u00a0(pp. 302-313) . Springer, Berlin, Heidelberg. Gottesman, D. (1998, February). Fault-tolerant quantum computation with higher-dimensional systems. In\u00a0 NASA International Conference on Quantum Computing and Quantum Communications\u00a0(pp. 302-313). Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_25_1","volume-title":"Quantum fingerprinting.\u00a0 Physical Review Letters,\u00a087 (16), 167902","author":"Buhrman H.","year":"2001","unstructured":"Buhrman , H. , Cleve , R. , Watrous , J. , & De Wolf , R. ( 2001 ). Quantum fingerprinting.\u00a0 Physical Review Letters,\u00a087 (16), 167902 . Buhrman, H., Cleve, R., Watrous, J., & De Wolf, R. (2001). Quantum fingerprinting.\u00a0 Physical Review Letters,\u00a087 (16), 167902."},{"key":"e_1_3_2_1_26_1","volume-title":"Quantum-process tomography: Resource analysis of different strategies.\u00a0 Physical Review A,\u00a077 (3), 032322","author":"Mohseni M.","year":"2008","unstructured":"Mohseni , M. , Rezakhani , A. T. , & Lidar , D. A. ( 2008 ). Quantum-process tomography: Resource analysis of different strategies.\u00a0 Physical Review A,\u00a077 (3), 032322 . Mohseni, M., Rezakhani, A. T., & Lidar, D. A. (2008). Quantum-process tomography: Resource analysis of different strategies.\u00a0 Physical Review A,\u00a077 (3), 032322."},{"key":"e_1_3_2_1_27_1","volume-title":"Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes.\u00a0 Quantum Information Processing,\u00a018 (5), 1-18","author":"Chen F. L.","year":"2019","unstructured":"Chen , F. L. , Zhang , L. H. , & Zhang , H. ( 2019 ). Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes.\u00a0 Quantum Information Processing,\u00a018 (5), 1-18 . Chen, F. L., Zhang, L. H., & Zhang, H. (2019). Controlled SWAP attack and improved quantum encryption of arbitrated quantum signature schemes.\u00a0 Quantum Information Processing,\u00a018 (5), 1-18."},{"key":"e_1_3_2_1_28_1","volume-title":"Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.\u00a0 Physical review letters,\u00a070 (13)","author":"Bennett C. H.","year":"1993","unstructured":"Bennett , C. H. , Brassard , G. , Cr\u00e9peau , C. , Jozsa , R. , Peres , A. , & Wootters , W. K. ( 1993 ). Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.\u00a0 Physical review letters,\u00a070 (13) , 1895. Bennett, C. H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., & Wootters, W. K. (1993). Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels.\u00a0 Physical review letters,\u00a070 (13), 1895."},{"key":"e_1_3_2_1_29_1","volume-title":"One-and two-dimensional quantum walks in arrays of optical traps.\u00a0 Physical Review A,\u00a072 (1), 012327","author":"Eckert K.","year":"2005","unstructured":"Eckert , K. , Mompart , J. , Birkl , G. , & Lewenstein , M. ( 2005 ). One-and two-dimensional quantum walks in arrays of optical traps.\u00a0 Physical Review A,\u00a072 (1), 012327 . Eckert, K., Mompart, J., Birkl, G., & Lewenstein, M. (2005). One-and two-dimensional quantum walks in arrays of optical traps.\u00a0 Physical Review A,\u00a072 (1), 012327."},{"key":"e_1_3_2_1_30_1","volume-title":"Realization of quantum walks with negligible decoherence in waveguide lattices.\u00a0 Physical review letters,\u00a0100 (17), 170506","author":"Perets H. B.","year":"2008","unstructured":"Perets , H. B. , Lahini , Y. , Pozzi , F. , Sorel , M. , Morandotti , R. , & Silberberg , Y. ( 2008 ). Realization of quantum walks with negligible decoherence in waveguide lattices.\u00a0 Physical review letters,\u00a0100 (17), 170506 . Perets, H. B., Lahini, Y., Pozzi, F., Sorel, M., Morandotti, R., & Silberberg, Y. (2008). Realization of quantum walks with negligible decoherence in waveguide lattices.\u00a0 Physical review letters,\u00a0100 (17), 170506."}],"event":{"name":"HP3C'22: 2022 6th International Conference on High Performance Compilation, Computing and Communications","acronym":"HP3C'22","location":"Jilin China"},"container-title":["Proceedings of the 6th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546012","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3546000.3546012","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:18Z","timestamp":1750188618000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3546000.3546012"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":30,"alternative-id":["10.1145\/3546000.3546012","10.1145\/3546000"],"URL":"https:\/\/doi.org\/10.1145\/3546000.3546012","relation":{},"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"2022-08-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}