Arbitrated quantum-signature scheme
Guihua Zeng,Christoph H. Keitel +1 more
Reads0
Chats0
TLDR
The general principle for a quantum-signature scheme is proposed and investigated and can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.Abstract:
The general principle for a quantum-signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.read more
Citations
More filters
Journal ArticleDOI
Improved Multi-party Quantum Key Agreement with Four-qubit Cluster States
TL;DR: Wang et al. as mentioned in this paper showed that Liu et al.'s protocol is insecure against a collusive attack, where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught.
Security Analysis for Arbitrated Quantum Signature Scheme based on Random Oracle Model
Lei Qi,Shang Tao,Liu Jianwei +2 more
Posted Content
Field Experiment on a Robust Hierarchical Metropolitan Quantum Cryptography Network
Fang-Xing Xu,Wei Chen,Shuang Wang,Zhen-Qiang Yin,Yang Zhang,Liu Yun,Zheng Zhou,Yi-Bo Zhao,Hong-Wei Li,Dong Liu,Zheng-Fu Han,Guang-Can Guo +11 more
TL;DR: A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this article, which includes a four-node backbone net with one node acting as the subnet gateway, a two-user subnet and a single fiber access link.
References
More filters
Book
Applied Cryptography: Protocols, Algorithms, and Source Code in C
Bruce Schneier,Phil Sutherland +1 more
TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.