Threshold proxy quantum signature scheme with threshold shared verification
From MaRDI portal
Recommendations
Cites work
- An Arbitrated Quantum Message Signature Scheme
- An efficient quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs
- Arbitrated quantum signature scheme with message recovery
- Bidirectional quantum secret sharing and secret splitting with polarized single photons
- Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states
- Eavesdropping on the two-way quantum communication protocols with invisible photons
- Efficient quantum key distribution scheme and a proof of its unconditional security
- How to share a secret
- Improving Wójcik's eavesdropping attack on the ping-pong protocol
- Improving the security of multiparty quantum secret sharing against an attack with a fake signal
- Multiparty quantum secret sharing
- Multiparty secret sharing of quantum information based on entanglement swapping
- Quantum cryptography based on Bell’s theorem
- Quantum cryptography using any two nonorthogonal states
- Quantum cryptography without public announcement of bases
- Quantum cryptography: public key distribution and coin tossing
- Quantum secret sharing
- Quantum secret sharing without entanglement
- Quantum secure direct communication based on order rearrangement of single photons
- Secure communication with single-photon two-qubit states
Cited in
(31)- Cryptanalysis of the quantum group signature protocols
- QUANTUM PROXY GROUP SIGNATURE SCHEME WITH χ-TYPE ENTANGLED STATES
- A novel quantum blind signature scheme with four-particle GHZ states
- Security problems in the quantum signature scheme with a weak arbitrator
- Security analysis of quantum multi-signature protocol based on teleportation
- Reexamination of arbitrated quantum signature: the impossible and the possible
- Security analysis of particular quantum proxy blind signature against the forgery attack
- Cryptanalysis of a quantum proxy weak blind signature scheme
- A blind signature protocol with exchangeable signature sequence
- Quantum signature scheme using a single qubit rotation operator
- Quantum \((t, n)\) threshold group signature based on Bell state
- Quantum proxy threshold multiple signature scheme
- A synchronous quantum blind signature scheme with entanglement swapping
- A novel quantum blind signature scheme with four-particle cluster states
- Semi-quantum ring signature protocol based on multi-particle GHZ state
- Cryptanalysis of a batch proxy quantum blind signature scheme
- Analysis of efficient quantum multi-proxy signature
- A novel quantum group signature scheme without using entangled states
- Analysis of counterfactual quantum certificate authorization
- Improved group signature scheme based on quantum teleportation
- Quantum proxy signature with provable security
- Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
- Quantum \((t,n)\) threshold proxy blind signature scheme based on Bell states
- New threshold-proxy threshold-signature schemes
- A new quantum proxy signature model based on a series of genuine entangled states
- Quantum blind signature scheme with cluster states based on quantum walk cryptosystem
- Quantum \((t, m, n)\) threshold group blind signature scheme with flexible number of participants
- Improved quantum signature scheme with weak arbitrator
- A novel quantum group proxy blind signature scheme based on five-qubit entangled state
- Quantum homomorphic signature based on Bell-state measurement
This page was built for publication: Threshold proxy quantum signature scheme with threshold shared verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q946395)