Skip to main content

and
  1. No Access

    Article

    Provably secure arbitrated-quantum signature

    Although the researchers have proposed many arbitrator quantum signature (AQS) for various applications in practice, the security proof of most AQSs was not strictly presented. Many results have shown that the...

    **angjun **n, Li Ding, Tianyuan Zhang, Qinglan Yang in Quantum Information Processing (2022)

  2. No Access

    Article

    Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator

    In this paper, a quantum signature scheme with semi-trusted arbitrator is proposed. In our scheme, the signatory encodes the classical message into non-orthogonal quantum sequence. Then, he generates the secre...

    **angjun **n, Li Ding, Qinglan Yang, Chaoyang Li in Quantum Information Processing (2022)

  3. No Access

    Article

    Quantum public-key designated verifier signature

    Based on the single-qubit rotations, a quantum public-key designated verifier signature (DVS) is proposed. In this scheme, a rotation vector is employed as the signatory’s secret key, and its corresponding qua...

    **angjun **n, Li Ding, Chaoyang Li, Yongxuan Sang in Quantum Information Processing (2021)

  4. No Access

    Article

    Security analysis and improvement of a quantum multi-signature protocol

    Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately, their protocol cannot resist against the forgery attack and...

    Qianqian He, **angjun **n, Qinglan Yang in Quantum Information Processing (2021)

  5. No Access

    Article

    Comments on the “Efficient quantum multi-proxy signature”

    Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency. Unfortunately, it is not secure against proxy attacks and forgery attack....

    Ruimei Tan, Qinglan Yang in Quantum Information Processing (2020)

  6. No Access

    Article

    Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information

    Based on the quantum asymmetric encryption with trapdoor information, a quantum public-key signature scheme is proposed. In our scheme, the signer signs a message with his/her private key, while the verifier v...

    **angjun **n, Qinglan Yang, Fagen Li in Quantum Information Processing (2020)

  7. No Access

    Article

    Quantum designated verifier signature based on Bell states

    Recently, Shi et al. proposed two quantum designated verifier signature (QDVS) schemes. First, we demonstrate the forgery attack and repudiation attack to Shi et al.’s quantum QDVS schemes. Then, a new QDVS sc...

    **angjun **n, Zhuo Wang, Qinglan Yang, Fagen Li in Quantum Information Processing (2020)