Chinese Journal of Quantum Electronics, Volume. 26, Issue 4, 442(2009)
Quantum signature protocol partly depending on arbitrage
[1] [1] Wiesner S. Conjugate coding [J]. Sigact News, 1983, 15(1): 78-88.
[2] [2] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C [M]. John Wiley and Sons Inc., 199
[3] [3] Bennett C. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.
[4] [4] Slutsky B A, Rao R, Pang C S, et al. Security of quantum cryptography against individual attacks [J]. Phys. Rev. A, 1998, 57: 2383-2398.
[5] [5] Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography [J]. J. of Cryptology, 1992, 5(1): 3-28.
[6] [6] Biham E, Huttner B, Mor T. Quantum cryptographic network based on quantum memories [J]. Phys. Rev. A, 1996, 54: 2651-2658.
[10] [10] Dusek M, Haderka O, Hendryeh M, et al. Quantum identification system [J]. Phys. Rev. A, 1999, 60: 149-156.
[11] [11] Zeng G H, Guo G. Quantum key distribution relied on trusted information center [OL]. e-print archieve, quant-ph/0001045.
[13] [13] Gottesman D, Chuang I. Quantum digital signatures[OL]. http://arxiv.org/abs/quant-ph/0105032, 2001.
[14] [14] Zeng G, Christoph K. An arbitrated quantum signature scheme [J]. Phys. Rev. A, 2002, 65: 042312.
[15] [15] Lee H, Hong C, Km H, et al. Arbitrated quantum signature scheme with message recovery [J]. Phys. Lett. A, 2004, 321: 295-300.
[17] [17] Zeng G, Zhang W. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303/1-5.
Get Citation
Copy Citation Text
ZHOU Rui, ZHU Yu-lan, NIE Yi-you, HUANG Yi-bin. Quantum signature protocol partly depending on arbitrage[J]. Chinese Journal of Quantum Electronics, 2009, 26(4): 442
Category:
Received: Sep. 8, 2008
Accepted: --
Published Online: May. 24, 2010
The Author Email:
CSTR:32186.14.