{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:58:32Z","timestamp":1760241512021,"version":"build-2065373602"},"reference-count":22,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2018,4,17]],"date-time":"2018-04-17T00:00:00Z","timestamp":1523923200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the National Key Research and Development Program of China","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>With the practical implementation of continuous-variable quantum cryptographic protocols, security problems resulting from measurement-device loopholes are being given increasing attention. At present, research on measurement-device independency analysis is limited in quantum key distribution protocols, while there exist different security problems for different protocols. Considering the importance of quantum digital signature in quantum cryptography, in this paper, we attempt to analyze the measurement-device independency of continuous-variable quantum digital signature, especially continuous-variable quantum homomorphic signature. Firstly, we calculate the upper bound of the error rate of a protocol. If it is negligible on condition that all measurement devices are untrusted, the protocol is deemed to be measurement-device-independent. Then, we simplify the calculation by using the characteristics of continuous variables and prove the measurement-device independency of the protocol according to the calculation result. In addition, the proposed analysis method can be extended to other quantum cryptographic protocols besides continuous-variable quantum homomorphic signature.<\/jats:p>","DOI":"10.3390\/e20040291","type":"journal-article","created":{"date-parts":[[2018,4,18]],"date-time":"2018-04-18T03:51:13Z","timestamp":1524023473000},"page":"291","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Measurement-Device Independency Analysis of Continuous-Variable Quantum Digital Signature"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"first","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing 100083, China"},{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100083, China"}]},{"given":"Ke","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100083, China"}]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Beihang University, Beijing 100083, China"},{"name":"School of Electronic and Information Engineering, Beihang University, Beijing 100083, China"}]}],"member":"1968","published-online":{"date-parts":[[2018,4,17]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"120405","DOI":"10.1103\/PhysRevLett.97.120405","article-title":"From Bell\u2019s theorem to secure quantum key distribution","volume":"97","author":"Acin","year":"2006","journal-title":"Phys. Rev. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","article-title":"Device-independent security of quantum cryptography against collective attacks","volume":"98","author":"Brunner","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"045021","DOI":"10.1088\/1367-2630\/11\/4\/045021","article-title":"Device-independent quantum key distribution secure against collective attacks","volume":"11","author":"Brunner","year":"2009","journal-title":"New J. Phys."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/ncomms1244","article-title":"Secure device-independent quantum key distribution with causally independent measurement devices","volume":"2","author":"Masanes","year":"2011","journal-title":"Nat. Commun."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.113.140501","article-title":"Fully device-independent quantum key distribution","volume":"113","author":"Vazirani","year":"2014","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-Device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.89.052301","article-title":"Continuous-variable measurement-device-independent quantum key distribution","volume":"89","author":"Li","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.90.052325","article-title":"Continuous-variable measurement-device-independent quantum key distribution using squeezed states","volume":"90","author":"Zhang","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1038\/nphoton.2015.83","article-title":"High-rate measurement-device-independent quantum cryptography","volume":"9","author":"Pirandola","year":"2015","journal-title":"Nat. Photon."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"022325","DOI":"10.1103\/PhysRevA.93.022325","article-title":"Continuous-variable measurement-device-independent multipartite quantum communication","volume":"93","author":"Wu","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/s10773-017-3545-x","article-title":"Continuous-variable Measurement-device-independent Quantum Relay Network with Phase-sensitive Amplifiers","volume":"57","author":"Li","year":"2018","journal-title":"Int. J. Theor. Phys."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"042340","DOI":"10.1103\/PhysRevA.95.042340","article-title":"Measurement-device-independent entanglement and randomness estimation in quantum networks","volume":"95","author":"Supic","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Rosset, D., Martin, A., Verbanis, E., Lim, C.C.W., and Thew, R. (arXiv, 2017). Practical measurement-device-independent entanglement quantification, arXiv.","DOI":"10.1103\/PhysRevA.98.052332"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1142\/S0219749907003031","article-title":"Continuous variable quantum signature algorithm","volume":"5","author":"Zeng","year":"2007","journal-title":"Int. J. Quantum Inf."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1007\/s10773-015-2867-9","article-title":"Arbitrated quantum signature scheme with continuous-variable coherent states","volume":"55","author":"Guo","year":"2016","journal-title":"Int. J. Theor. Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"012329","DOI":"10.1103\/PhysRevA.93.012329","article-title":"Experimental demonstration of kilometer-range quantum digital signatures","volume":"93","author":"Donaldson","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","article-title":"Alternative schemes for measurement-device-independent quantum key distribution","volume":"86","author":"Ma","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"190502","DOI":"10.1103\/PhysRevLett.97.190502","article-title":"Optimality of Gaussian attacks in continuous-variable quantum cryptography","volume":"97","author":"Navascues","year":"2006","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1007\/s11128-017-1689-5","article-title":"Continuous-variable quantum homomorphic signature","volume":"16","author":"Li","year":"2017","journal-title":"Quantum Inf. Process."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"110504","DOI":"10.1103\/PhysRevLett.102.110504","article-title":"de Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography","volume":"102","author":"Renner","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_22","first-page":"3","article-title":"Bounds for the quantity of information transmitted by a quantum communication channel","volume":"9","author":"Holevo","year":"1973","journal-title":"Probl. Peredachi Inf."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/4\/291\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:01:00Z","timestamp":1760194860000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/20\/4\/291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,17]]},"references-count":22,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,4]]}},"alternative-id":["e20040291"],"URL":"https:\/\/doi.org\/10.3390\/e20040291","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2018,4,17]]}}}