期刊文献+

Weak blind quantum signature protocol based on entanglement swapping

Weak blind quantum signature protocol based on entanglement swapping
原文传递
导出
摘要 In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verification security services to ensure the validity of the verification. In order to guarantee the unconditional security of the scheme, the quantum key distribution protocol and one-time pad encryption algorithm are employed in our scheme. Besides, the entanglement swapping of Bell states mechanism enhances the security of verification criteria. The proposed scheme has the properties of nonforgeability, nonrepudiation, lindness,and traceability. In this paper, we put forward a weak blind quantum signature scheme based on quantum entanglement swapping of Bell states. Different from the existing quantum signature schemes, our scheme can offer two-step verification security services to ensure the validity of the verification. In order to guarantee the unconditional security of the scheme, the quantum key distribution protocol and one-time pad encryption algorithm are employed in our scheme. Besides, the entanglement swapping of Bell states mechanism enhances the security of verification criteria. The proposed scheme has the properties of nonforgeability, nonrepudiation, lindness,and traceability.
出处 《Photonics Research》 SCIE EI 2015年第6期324-328,共5页 光子学研究(英文版)
基金 supported by the National Natural Science Foundation of China (grant no. 61273250)
  • 相关文献

参考文献3

二级参考文献105

  • 1Chaum D 1983 Advances in Cryptology-Crypto 1982 (Berlin: Springer-Verlag) p. 199. 被引量:1
  • 2Benaloh J and Yung D 1986 Proceedings of the 5th ACM Symposium on Principles of Distributed Computing (New York: ACM Press) p. 52. 被引量:1
  • 3ElGamal T 1985 IEEE Transaction on Information Theory IT-31 469. 被引量:1
  • 4Chaum D, Fait A and Naor M 1988 Advances in Cryptology-Crypto 1988 (Berlin: Springer-Verlag) p. 319. 被引量:1
  • 5Brands S 1994 Advances in Cryptology-Crypto 1993 (Berlin: Springer-Verlag) p. 302. 被引量:1
  • 6Camenisch J L, Pivetau J M and Stadler M A 1995 Advances in Cryptology-Eurocrypto 1995 (Berlin: Springer-Verlag) p. 428. 被引量:1
  • 7Abe M and Okamoto T 2000 Advances in Cryptology-Crypto 2000 (Berlin: Springer-Verlag) p. 271. 被引量:1
  • 8Wang T Y, Cai X Q and Zhang J Z 2007 Application Research of Computers 24 130. 被引量:1
  • 9Stadler M, Piveteau J M and Camenisch J 1995 Advances in Cryptology-Eurocrypto 1995 (Berlin: Springer-Verlag) p. 209. 被引量:1
  • 10Camenisch J, Piveteau J M and Stadler M 1996 Proceedings of the 3rd ACM Conference on Computer and Communications Security (New York: ACM Press) p. 88. 被引量:1

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部