-
Article
Secure quantum network coding based on quantum homomorphic message authentication
As the principal security threat, pollution attacks also seriously affect the security of quantum network coding, just like they do for the classical network coding. Based on this, we first propose two secure ...
-
Article
Quantum multi-proxy blind signature based on cluster state
Different from traditional digital signatures, quantum blind signatures can implement a signature without knowing the specific content, and their security is guaranteed by the basic principles of quantum mecha...
-
Article
Quantum sealed-bid auction protocol based on quantum secret sharing
A quantum sealed-bid auction (QSA) with post-confirmation can realize the public verification of the honesty of bidders. In this paper, we apply the quantum secret sharing (QSS) into the post-confirmation. Sur...
-
Article
Semi-quantum ring signature protocol based on multi-particle GHZ state
The emergence of semi-quantum protocols reduces the conditions for the implementation of quantum signatures, so that users without quantum capabilities can communicate securely. As a kind of quantum signature,...