• Photonics Research
  • Vol. 3, Issue 6, 324 (2015)
Minghui Zhang* and Huifang Li
Author Affiliations
  • School of Electronic and Information, Northwestern Polytechnical University, Xi’an 710129, China
  • show less
    DOI: 10.1364/PRJ.3.000324 Cite this Article Set citation alerts
    Minghui Zhang, Huifang Li, "Weak blind quantum signature protocol based on entanglement swapping," Photonics Res. 3, 324 (2015) Copy Citation Text show less
    References

    [1] W. Diffie, M. Hellman. New directions in cryptography. IEEE Trans. Inf. Theory., 22, 644-654(1976).

    [2] D. Gottesman, I. Chuang. Quantum digital signatures, 1-8(2001).

    [3] G. H. Zeng, C. H. Keitel. Arbitrated quantum-signature scheme. Phys. Rev. A, 65, 042312(2002).

    [4] H. Lee, C. Hong, H. Kim, J. Lim, H. J. Yang. Arbitrated quantum signature scheme with message recovery. Phys. Lett. A, 321, 295-300(2004).

    [5] X. J. Wen, Y. Liu, Y. Sun. Quantum multi-signature protocol based on teleportation. Z. Naturforsch., 62, 147-151(2007).

    [6] G. H. Zeng, M. H. Lee, Y. Guo, G. Q. He. Continuous variable quantum signature algorithm. Int. J. Quantum Inform., 5, 553-573(2007).

    [7] M. Curty, N. Lütkenhaus. Comment on ‘arbitrated quantum-signature scheme. Phys. Rev. A, 77, 046301(2008).

    [8] G. H. Zeng. Reply to ‘comment on arbitrated quantum-signature scheme. Phys. Rev. A, 78, 016301(2008).

    [9] Q. Li, W. H. Chan, D. Y. Long. Arbitrated quantum signature scheme using Bell states. Phys. Rev. A, 79, 054307(2009).

    [10] X. F. Zou, D. W. Qiu. Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A, 82, 042325(2010).

    [11] X. J. Wen, X. M. Niu, L. P. Ji, Y. Tian. A weak blind signature scheme based on quantum cryptography. Opt. Commun., 282, 666-669(2009).

    [12] M. Naseri. Comment on a weak blind signature based on quantum cryptography. Int. J. Phys. Sci., 6, 5051-5053(2011).

    [13] Q. Su, Z. Huang, Q. Y. Wen, W. Li. Quantum blind signature based on two-state vector formalism. Opt. Commun., 283, 4408-4410(2010).

    [14] C. W. Yang, T. Hwang, Y. P. Luo. Enhancement on ‘quantum blind signature based on two-state vector formalism. Quantum Inf. Process., 12, 109-117(2013).

    [15] M. Zhang, G. A. Xu, X. B. Chen, S. Yang, Y. X. Yang. Attack on the improved quantum blind signature protocol. Int. J. Theor. Phys., 52, 331-335(2013).

    [16] Q. Su, W. M. Li. Cryptanalysis of enhancement on ‘quantum blind signature based on two-state vector formalism. Quantum Inf. Process., 13, 1245-1254(2014).

    [17] T. Y. Wang, Q. Y. Wen. Fair quantum blind signatures. Chin. Phys. B, 19, 060307(2010).

    [18] L. B. He, L. S. Huang, W. Yang, R. Xu. Cryptanalysis of fair quantum blind signatures. Chin. Phys. B, 21, 030306(2012).

    [19] X. F. Zou, D. W. Qiu. Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process., 12, 2071-2085(2013).

    [20] X. R. Yin, W. P. Ma, W. Y. Liu. A blind quantum signature scheme with χ-type entangled states. Int. J. Theor. Phys., 51, 455-461(2012).

    [21] M. M. Wang, X. B. Chen, Y. X. Yang. A blind quantum signature protocol using the GHZ states. Sci. China, 56, 1636-1643(2013).

    [22] S. Khodambashi, A. Zakerolhosseini. A sessional blind signature based on quantum cryptography. Quantum Inf. Process., 13, 121-130(2014).

    [23] Q. Su, W. M. Li. Cryptanalysis of a sessional blind signature based on quantum cryptography. Quantum Inf. Process., 13, 1917-1929(2014).

    [24] T. Y. Wang, X. Q. Cai, R. L. Zhang. Reexamining the security of fair quantum blind signature schemes. Quantum Inf. Process., 13, 1677-1685(2014).

    [25] M. Zukowski, A. Zeilinger, M. A. Horne, A. K. Ekert. Event-ready-detectors bell experiment via entanglement swapping. Phys. Rev. Lett., 71, 4287-4290(1993).

    [26] C. H. Bennett. Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett., 68, 3121-3124(1992).

    [27] P. O. Boykin, V. Roychowdhury. Optimal encryption of quantum bits. Phys. Rev. A, 67, 042317(2003).

    [28] H. Meijer, S. Akl. Advance in cryptography. Proceedings of Crypto ’81, 65(1981).