Search
Search Results
-
-
Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol
Recently, Qiu et al. proposed a semi-quantum voting scheme based on the ring signature (International Journal of Theoretical Physics, 60:...
-
Security Analysis and Improvement of a Blind Semi-quantum Signature
Recently, **a et al. proposed a semi-quantum blind signature protocol based on five-particle GHZ state. Their protocol can reduce the computation...
-
Authenticable quantum multi-secret sharing scheme based on monotone span program
Quantum multi-secret sharing plays a vital role in secure multi-key management. In this paper, an authenticable quantum multi-secret sharing scheme...
-
Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack
As an important topic of quantum cryptography, quantum proxy blind signature has attracted more and more attentions in recent years. However, with...
-
Quantum Digital Signature with Continuous-Variable
This paper presents a new continuous-variable quantum digital signature (CV-QDS) protocol which is more compatible with proven optical...
-
Quantum Signature without Classical Private Key
Generally, in a quantum signature protocol, the signature is produced with the signatory’s classical private key, which is a secret bit string. In...
-
Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party
Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding using DVS attributes to protect the secret...
-
Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator
In this paper, a quantum signature scheme with semi-trusted arbitrator is proposed. In our scheme, the signatory encodes the classical message into...
-
A rational hierarchical (t,n)-threshold quantum secret sharing scheme
Quantum secret sharing plays a crucial role in quantum cryptography. In this paper, we present a rational hierarchical (t,n) -threshold quantum secret...
-
Security analysis and improvement of a quantum multi-signature protocol
Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately,...
-
Secure quantum signature scheme without entangled state
The security of most quantum signatures cannot be proved with security model under chosen-message attack. No formal proof can prove that their...
-
Universal construction of a full quantum one-way function
Classical one-way function is a fundamental part of cryptography. Its one-wayness is threatened by the emerging quantum computers. Quantum one-way...
-
Provably secure arbitrated-quantum signature
Although the researchers have proposed many arbitrator quantum signature (AQS) for various applications in practice, the security proof of most AQSs...
-
Quantum attacks against BBB secure PRFs or MACs built from public random permutations
Since the seminal work of Chen et al. to construct pseudorandom functions (PRFs) from the public random permutations, a series of designs of...
-
Comments on the “Efficient quantum multi-proxy signature”
Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency....
-
Quantum Signature Scheme for Participant Attack
We present a quantum signature scheme for a participant attack using only Pauli operators. The arbitrator verifies the signature and serves to...
-
Quantum key recovery attacks on tweakable Even–Mansour ciphers
As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage...
-
Quantum security analysis of Rocca
The recent developments in the creation of large-scale, commercially feasible quantum computers puts both symmetric and asymmetric encryption at...
-
A Verifiable (k,n)-Threshold Quantum Secure Multiparty Summation Protocol
Quantum secure multiparty summation plays an important role in quantum cryptography. In the existing quantum secure multiparty summation protocols,...