• Chinese Journal of Quantum Electronics
  • Vol. 33, Issue 1, 35 (2016)
Hui WANG*, Runhua SHI, Hong ZHONG, Jie CUI, Shun ZHANG, and Kaiting WANG
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2016.01.005 Cite this Article
    WANG Hui, SHI Runhua, ZHONG Hong, CUI Jie, ZHANG Shun, WANG Kaiting. Quantum proxy blind signature based on W state[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 35 Copy Citation Text show less
    References

    [1] Chaum D. Blind signatures for untraceable payments[C]. Advances in Cryptology, Springer US, 1983: 199-203.

    [2] Mambo M, Usuda K, Okamoto E. Proxy signatures: Delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 1996, 79(9): 1338-1354.

    [3] Chien Hungyu, Jan Jinnke, Tseng Yuhmin. RSA-based partially blind signature with low computation[C]. Parallel and Distributed Systems, ICPADS 2001. Eighth International Conference on IEEE[M]. 2001: 385-389.

    [4] Traore J. Group signatures and the irrelevance to privacy-protecting off-line electronic cash systems[C]. LNCS 1587: Australasian Conference on Information Security and Privacy, ACISP’99[M]. Springer-Verlag, 1999: 228-243.

    [5] Jeong I R, Lee D H, Lim J I. Efficient transferable cash with group signatures[C]. Springer Berlin Heidelberg, 2001: 462-474.

    [6] Maitland G, Boyd C. Fair electronic cash based on a group signature scheme[C]. Information Security and Privacy (ACISP03), LNCS 2727, Springer, 2001: 461-465.

    [8] Zeng Guihua, Keitel C H. Arbitrated quantum-signature scheme[J]. Phys. Rev. A, 2002, 65(4): 042312.

    [9] Lee Hwayean, Hong Changho, et al. Arbitrated quantum signature scheme with message recovery[J]. Phys. Lett. A, 2004, 321(5): 295-300.

    [10] Lü Xin, Feng Dengguo. An arbitrated quantum message signature scheme[C]. CIS2004, LNCS 3314, 2004: 1054-1060.

    [11] Wen Xiaojun, Liu Yun, Sun Yu. Quantum multi-signature protocol based on teleportation[J]. Zeitschrift Fur Naturforschung A, 2007, 62(3/4): 147.

    [12] Wen Xiaojun, Liu Yun. Secure authentic digital signature scheme using quantum fingerprinting[J]. Chinese Journal of Electronics, 2008, 17(2): 340-344.

    [14] Wen Xiaojun, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications, 2009, 282(4): 666-669.

    [16] Wen Xiaojun, Chen Yongzhi, Fang Junbin. An inter-bank E-payment protocol based on quantum proxy blind signature[J]. Quantum Information Processing, 2013, 12(1): 549-558.

    [17] Cao Haijing, Zhu Yanyan, Li Pengfei. A quantum proxy weak blind signature scheme[J]. International Journal of Theoretical Physics, 2014, 53(2): 419-425.

    [19] Yang Chunwei, Hwang Tzonelih, Luo Yiping. Enhancement on “quantum blind signature based on two-state vector formalism”[J]. Quantum Information Processing, 2013, 12(1): 109-117.

    [20] Zuo Huijuan. Cryptanalysis of quantum blind signature scheme[J]. International Journal of Theoretical Physics, 2013, 52(1): 322-329.

    [21] Zou Xiangfu, Qiu Daowen. Attack and improvements of fair quantum blind signature schemes[J]. Quantum Information Processing, 2013, 12(6): 2071-2085.

    WANG Hui, SHI Runhua, ZHONG Hong, CUI Jie, ZHANG Shun, WANG Kaiting. Quantum proxy blind signature based on W state[J]. Chinese Journal of Quantum Electronics, 2016, 33(1): 35
    Download Citation