We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 244 results
  1. Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol

    Recently, Qiu et al. proposed a semi-quantum voting scheme based on the ring signature (International Journal of Theoretical Physics, 60:...

    Qiu Shu**g, **n **angjun, ... Li Fagen in International Journal of Theoretical Physics
    Article 23 March 2024
  2. Security Analysis and Improvement of a Blind Semi-quantum Signature

    Recently, **a et al. proposed a semi-quantum blind signature protocol based on five-particle GHZ state. Their protocol can reduce the computation...

    Jie Cao, **angjun **n, ... Fagen Li in International Journal of Theoretical Physics
    Article 22 April 2023
  3. Authenticable quantum multi-secret sharing scheme based on monotone span program

    Quantum multi-secret sharing plays a vital role in secure multi-key management. In this paper, an authenticable quantum multi-secret sharing scheme...

    Lele Li, Zhaowei Han, Feiting Guan in Quantum Information Processing
    Article 08 September 2023
  4. Security Analysis of Particular Quantum Proxy Blind Signature Against the Forgery Attack

    As an important topic of quantum cryptography, quantum proxy blind signature has attracted more and more attentions in recent years. However, with...

    Bao-Min Zhou, Lian-Dong Lin, ... Ying Liu in International Journal of Theoretical Physics
    Article 02 December 2019
  5. Quantum Digital Signature with Continuous-Variable

    This paper presents a new continuous-variable quantum digital signature (CV-QDS) protocol which is more compatible with proven optical...

    Xu Deng, Wei Zhao, ... Huilong Fan in International Journal of Theoretical Physics
    Article 23 May 2022
  6. Quantum Signature without Classical Private Key

    Generally, in a quantum signature protocol, the signature is produced with the signatory’s classical private key, which is a secret bit string. In...

    Mingcan Chen, **angjun **n, Dongsheng Chen in International Journal of Theoretical Physics
    Article 09 February 2022
  7. Quantum Designated Verifier Signature Scheme with Semi-Trusted Third-Party

    Designated verifier signature (DVS) schemes can be applied in many scenes, such as E-voting and E-bidding using DVS attributes to protect the secret...

    Ling Zhang, Jia-Hao Zhang, ... Min Huang in International Journal of Theoretical Physics
    Article 02 August 2023
  8. Efficient chain-encryption-based quantum signature scheme with semi-trusted arbitrator

    In this paper, a quantum signature scheme with semi-trusted arbitrator is proposed. In our scheme, the signatory encodes the classical message into...

    **angjun **n, Li Ding, ... Yongxuan Sang in Quantum Information Processing
    Article 16 July 2022
  9. A rational hierarchical (t,n)-threshold quantum secret sharing scheme

    Quantum secret sharing plays a crucial role in quantum cryptography. In this paper, we present a rational hierarchical (t,n) -threshold quantum secret...

    Fulin Li, Zhuo Liu, ... Shixin Zhu in Quantum Information Processing
    Article 12 February 2024
  10. Security analysis and improvement of a quantum multi-signature protocol

    Recently, Jiang et al. proposed a novel quantum multi-signature protocol based on locally indistinguishable orthogonal product states. Unfortunately,...

    Qianqian He, **angjun **n, Qinglan Yang in Quantum Information Processing
    Article 11 January 2021
  11. Secure quantum signature scheme without entangled state

    The security of most quantum signatures cannot be proved with security model under chosen-message attack. No formal proof can prove that their...

    Tianyuan Zhang, **angjun **n, ... Fagen Li in Quantum Information Processing
    Article 06 February 2024
  12. Universal construction of a full quantum one-way function

    Classical one-way function is a fundamental part of cryptography. Its one-wayness is threatened by the emerging quantum computers. Quantum one-way...

    Yao Tang, Tao Shang, Jianwei Liu in Quantum Information Processing
    Article 26 July 2022
  13. Provably secure arbitrated-quantum signature

    Although the researchers have proposed many arbitrator quantum signature (AQS) for various applications in practice, the security proof of most AQSs...

    **angjun **n, Li Ding, ... Chaoyang Li in Quantum Information Processing
    Article 22 November 2022
  14. Quantum attacks against BBB secure PRFs or MACs built from public random permutations

    Since the seminal work of Chen et al. to construct pseudorandom functions (PRFs) from the public random permutations, a series of designs of...

    Jiehui Nan, Honggang Hu, ... Yiyuan Luo in Quantum Information Processing
    Article 17 December 2022
  15. Comments on the “Efficient quantum multi-proxy signature”

    Recently, a novel quantum multi-proxy signature scheme was proposed by Qin et al. It has flexible proxy delegation and high efficiency....

    Ruimei Tan, Qinglan Yang in Quantum Information Processing
    Article 24 August 2020
  16. Quantum Signature Scheme for Participant Attack

    We present a quantum signature scheme for a participant attack using only Pauli operators. The arbitrator verifies the signature and serves to...

    Kitak Won, **o Heo, ... Hyung-** Yang in Journal of the Korean Physical Society
    Article 30 August 2019
  17. Quantum key recovery attacks on tweakable Even–Mansour ciphers

    As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage...

    ** Zhang, Yiyuan Luo in Quantum Information Processing
    Article 04 September 2023
  18. Quantum security analysis of Rocca

    The recent developments in the creation of large-scale, commercially feasible quantum computers puts both symmetric and asymmetric encryption at...

    Ravi Anand, Takanori Isobe in Quantum Information Processing
    Article 31 March 2023
  19. A Verifiable (k,n)-Threshold Quantum Secure Multiparty Summation Protocol

    Quantum secure multiparty summation plays an important role in quantum cryptography. In the existing quantum secure multiparty summation protocols,...

    Fulin Li, Hang Hu, ... ** Li in International Journal of Theoretical Physics
    Article 21 January 2023
Did you find what you were looking for? Share feedback.