An Arbitrated Proxy Blind Signature Based on Hyper Entanglement Analysis
暂无分享,去创建一个
Xiaoping Lou | Wensheng Tang | Hua Ma | Ming Yi | X. Lou | Wensheng Tang | Hua Ma | Ming Yi
[1] Hai-Jing Cao,et al. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation , 2015 .
[2] Hai-Yan Zhang,et al. The Security Analysis and Improvement of Some Novel Quantum Proxy Signature Schemes , 2017 .
[3] Kejia Zhang,et al. Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme , 2015 .
[4] Shu-Cui Xie,et al. An E-payment Protocol Based on Quantum Multi-proxy Blind Signature , 2017, International Journal of Theoretical Physics.
[5] Lov K. Grover. A fast quantum mechanical algorithm for database search , 1996, STOC '96.
[6] Tao Li,et al. High-Capacity Quantum Secure Direct Communication Based on Quantum Hyperdense Coding with Hyperentanglement , 2011 .
[7] G. Long,et al. Theoretically efficient high-capacity quantum-key-distribution scheme , 2000, quant-ph/0012056.
[8] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[9] Fuguo Deng,et al. Deterministic entanglement purification and complete nonlocal Bell-state analysis with hyperentanglement , 2010 .
[10] Xiao-Qiu Cai,et al. Cryptanalysis of a Batch Proxy Quantum Blind Signature Scheme , 2014 .
[11] Yuan Tian,et al. A proxy blind signature scheme based on quantum entanglement , 2013, Optical and Quantum Electronics.
[12] Hai-Jing Cao,et al. A Quantum Proxy Weak Blind Signature Scheme , 2014 .
[13] Hai-Jing Cao,et al. A Quantum Proxy Signature Scheme Based on Genuine Five-qubit Entangled State , 2014 .
[14] Jinye Peng,et al. Efficient Quantum Private Communication Based on Dynamic Control Code Sequence , 2017 .
[15] Haipeng Peng,et al. Restricted (k, n)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states , 2017, Quantum Inf. Process..
[16] Heinrich Saller. Quantum Relativity , 2017 .
[17] Nathan K Langford,et al. Generation of hyperentangled photon pairs. , 2005, Physical review letters.
[18] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[19] Li-Hua Gong,et al. A continuous variable quantum deterministic key distribution based on two-mode squeezed states , 2014 .
[20] Charles H. Bennett,et al. Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. , 1992, Physical review letters.
[21] Jinye Peng,et al. Quantum Secure Direct Communication Scheme in the Non-symmetric Channel with High Efficiency and Security , 2015 .
[22] Hai-Jing Cao,et al. Quantum Proxy Multi-Signature Scheme Using Genuinely Entangled Six Qubits State , 2013 .
[23] Jian-Wei Pan,et al. Polarization entanglement purification using spatial entanglement. , 2001, Physical review letters.
[24] Liming Zhao,et al. Computing on quantum shared secrets , 2017, 1702.03689.
[25] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[26] Hai-Jing Cao,et al. A New Quantum Proxy Multi-signature Scheme Using Maximally Entangled Seven-Qubit States , 2016 .
[27] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[28] Ying Guo,et al. Batch proxy quantum blind signature scheme , 2011, Science China Information Sciences.
[29] Ahmed Farouk,et al. New quantum dialogue protocol based on continuous-variable two-mode squeezed vacuum states , 2017, Quantum Inf. Process..
[30] Yu-Bo Sheng,et al. Complete hyperentangled-Bell-state analysis for quantum communication , 2010, 1103.0230.
[31] Jie Song,et al. Complete hyperentanglement-assisted multi-photon Greenberger–Horne–Zeilinger states analysis with cross-Kerr nonlinearity , 2014 .
[32] Guihua Zeng,et al. Arbitrated quantum-signature scheme , 2001, quant-ph/0109007.
[33] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[34] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.