Arbitrated quantum-signature scheme
Citations
216 citations
192 citations
161 citations
159 citations
132 citations
References
3,432 citations
"Arbitrated quantum-signature scheme..." refers background or methods in this paper
...n subsequently be verified using a verification algorithm QVK′ with key K′. Note the keys Kand K′ may be the same (symmetrical key cryptosystem) as assumed here or be different (public key cryptosystem) [8]. Given a pair (|Pi,|Si), the verification algorithm when applied is required to result “true” or “false” depending on whether the signature is authentic or forged. A quantum signature scheme may thus ...
[...]
...forward several aspects to be expected to be fulfilled for a quantum signature scheme and which have led us to design the quantum signature algorithm to follow. Similar to classical digital signatures [8] we demand the following signature rules where only the last is characteristic for quantum signature schemes: • No modifications and no forgery: Neither the receiver nor a possible attacker are able to...
[...]
...e developed classically so far for this purpose as an addition to a message such that the message can neither be disavowed by the signatory nor can it be forged by the receiver or a possible attacker [8]. Up to now, conventional (handwritten) and digital approaches have been employed in practical applications. While conventional signatures can not be transmitted in the electronic network and are vuln...
[...]