• Chinese Journal of Quantum Electronics
  • Vol. 28, Issue 3, 341 (2011)
Yong-zhi CHEN1、2、*, Yun LIU1, and Xiao-jun WEN1、3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: Cite this Article
    CHEN Yong-zhi, LIU Yun, WEN Xiao-jun. A quantum proxy weak blind signature scheme[J]. Chinese Journal of Quantum Electronics, 2011, 28(3): 341 Copy Citation Text show less
    References

    [1] Lin Minhui, Chang Chinchen, Chen Yanren. A fair and secure mobile agent environment based on blind signature and proxy host [J]. Computers and Security, 2004, 23, 199-212.

    [2] Chen Yuyi, Jan Jinnke, Chen Chinling. The design of a secure anonymous Internet voting system [J]. Computers and Security, 2004, 23, 330-337.

    [4] Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages [J]. IEICE Transactions on Fundamentals, 1996, E79-A (9): 1338-1354.

    [5] Yu Baozheng, Xu Congwei. A proxy blind signature scheme based on DLP [J]. Wuhan University Journal of Natural Sciences, 2007, 12(1): 083-086.

    [6] Lu Rongxing, Cao Zhenfu, Zhou Yuan. Proxy blind multi-signature scheme without a secure channel [J]. Applied Mathematics and Computation, 2005,164: 179-187.

    [8] Sun Hungmin, Hsieh Bintsan, Tseng Shinmu. On the security of some proxy blind signature schemes [J]. Journal of Systems and Software, 2005, 74: 297-302.

    [12] Gottesman D, Chuang I. Quantum digital signatures [OL]. http://arxiv.org/abs/quant-ph/0105032.

    [17] Wen Xiaojiu, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography [J]. Optics Communications, 2009, 282: 666-669.

    [18] Gao Ting, Yan Fengli, Wang Zhixi. Controlled quantum teleportation and secure direct communication [J]. Chinese Physics, 2005, 14(05): 893-897.

    CHEN Yong-zhi, LIU Yun, WEN Xiao-jun. A quantum proxy weak blind signature scheme[J]. Chinese Journal of Quantum Electronics, 2011, 28(3): 341
    Download Citation