• Chinese Journal of Quantum Electronics
  • Vol. 33, Issue 6, 711 (2016)
Hongdi YAO*, Hai ZOU, and Chengbin DU
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461. 2016.06.010 Cite this Article
    YAO Hongdi, ZOU Hai, DU Chengbin. A quantum multi-proxy blind signature scheme with multiplayer verification[J]. Chinese Journal of Quantum Electronics, 2016, 33(6): 711 Copy Citation Text show less
    References

    [1] Singh P, Sharm P K, Aggarwal T K. Cryptography and network security principles and practices [J]. International Annals of Criminology, 2003, 4(4): 121-136.

    [2] Cao Z, Liu M. Classification of signature-only signature models [J]. Science in China Series F: Information Sciences, 2008, 51(8): 1083-1095.

    [5] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C [M]. 2nd ed., New York: John Wiley and Sons, 1996: 79-80.

    [6] Lu R X, Dong X L, Cao Z F. Designing efficient proxy signature schemes for mobile communication [J]. Science in China Series F: Information Sciences, 2008, 51(2): 183-195.

    [7] Sun Ying, Wen Qiaoyan, Zhu Fuchen. Quantum secure communication based on the reusable bases sequences [J]. Acta Eletronica Sinica, 2010, 38(1): 111-116.

    [8] Curty M, Santos D J. Qubit authentacation [J]. Phys. Rev. A, 2002, 66: 022301.

    [11] Chuang I, Gottesman D. Quantum digital signatures: U.S. Patent 7, 246, 240 [P]. 2007-7-17.

    [12] Zeng G, Ma W, Wang X, et al. Signature scheme based on quantum cryptography [J]. Acta Electronica Sinica, 2001, 29(8): 1098-1100.

    [13] Wen X, Niu X, Ji L, et al. A weak blind signature scheme based on quantum cryptography [J]. Optics Communications, 2009, 282(4): 666-669.

    [14] Yang Y G, Wen Q Y. Threshold proxy quantum signature scheme with threshold shared verification [J]. Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51(8): 1079-1088.

    [15] Shi J H, Zhang S L, Chang Z G. The security analysis of a threshold proxy quantum signature scheme [J]. Science China Physics, Mechanics and Astronomy, 2013, 5(3): 519-523.

    [16] Buhrman H, Cleve R, Watrous J, et al. Quantum fingerprinting [J]. Phys. Rev. Lett., 2001, 87(16): 167902.

    YAO Hongdi, ZOU Hai, DU Chengbin. A quantum multi-proxy blind signature scheme with multiplayer verification[J]. Chinese Journal of Quantum Electronics, 2016, 33(6): 711
    Download Citation