Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states
DOI10.1007/S10773-022-05112-YzbMath1501.81014OpenAlexW4288070050WikidataQ114209877 ScholiaQ114209877MaRDI QIDQ2165334
Publication date: 19 August 2022
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-022-05112-y
Quantum computation (81P68) Spinor and twistor methods applied to problems in quantum theory (81R25) Authentication, digital signatures and secret sharing (94A62) Quantum coherence, entanglement, quantum correlations (81P40) Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum control (81Q93) Quantum cryptography (quantum-theoretic aspects) (81P94) Quantum gates (81P65)
Related Items (2)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A novel quantum blind signature scheme with four-particle GHZ states
- A \((t,n)\)-threshold scheme of multi-party quantum group signature with irregular quantum Fourier transform
- Quantum cryptography: public key distribution and coin tossing
- A Bargmann system and the involutive solutions associated with a new 4-order lattice hierarchy
- Efficient quantum multi-proxy signature
- Threshold proxy quantum signature scheme with threshold shared verification
- Quantum multi-proxy blind signature scheme based on four-qubit cluster states
- A quantum blind signature scheme based on block encryption and quantum Fourier transfer
- Quantum blind signature scheme based on quantum walk
- Security analysis of particular quantum proxy blind signature against the forgery attack
- A quantum proxy blind signature scheme based on superdense coding
- A novel quantum group proxy blind signature scheme based on five-qubit entangled state
- A quantum proxy signature scheme by using random sequence to blind the message
- Quantum \((t, n)\) threshold group signature based on Bell state
- Comments on the ``Efficient quantum multi-proxy signature
- How to share a secret
- Unconditional security in quantum cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
This page was built for publication: Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states