期刊文献+

Fair quantum blind signatures 被引量:3

Fair quantum blind signatures
下载PDF
导出
摘要 We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed. We present a new fair blind signature scheme based on the fundamental properties of quantum mechanics. In addition, we analyse the security of this scheme, and show that it is not possible to forge valid blind signatures. Moreover, comparisons between this scheme and public key blind signature schemes are also discussed.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第6期66-70,共5页 中国物理B(英文版)
基金 Project supported by the National Natural Science Foundation of China (Grant Nos.60873191,60903152 and 60821001) the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No.200800131016) Beijing Nova Program (Grant No.2008B51) Key Project of the Chinese Ministry of Education (Grant No.109014) the Natural Science Foundation of Beijing (Grant No.4072020) China Postdoctoral Science Foundation (Grant No.20090450018) the Natural Science Foundation of the Education Bureau of Henan Province of China (Grant No.2010B120008) the Youth Foundation of Luoyang Normal University
关键词 fair blind signature single photons hash function fair blind signature, single photons, hash function
  • 相关文献

参考文献45

  • 1Chaum D 1983 Advances in Cryptology-Crypto 1982 (Berlin: Springer-Verlag) p. 199.
  • 2Benaloh J and Yung D 1986 Proceedings of the 5th ACM Symposium on Principles of Distributed Computing (New York: ACM Press) p. 52.
  • 3ElGamal T 1985 IEEE Transaction on Information Theory IT-31 469.
  • 4Chaum D, Fait A and Naor M 1988 Advances in Cryptology-Crypto 1988 (Berlin: Springer-Verlag) p. 319.
  • 5Brands S 1994 Advances in Cryptology-Crypto 1993 (Berlin: Springer-Verlag) p. 302.
  • 6Camenisch J L, Pivetau J M and Stadler M A 1995 Advances in Cryptology-Eurocrypto 1995 (Berlin: Springer-Verlag) p. 428.
  • 7Abe M and Okamoto T 2000 Advances in Cryptology-Crypto 2000 (Berlin: Springer-Verlag) p. 271.
  • 8Wang T Y, Cai X Q and Zhang J Z 2007 Application Research of Computers 24 130.
  • 9Stadler M, Piveteau J M and Camenisch J 1995 Advances in Cryptology-Eurocrypto 1995 (Berlin: Springer-Verlag) p. 209.
  • 10Camenisch J, Piveteau J M and Stadler M 1996 Proceedings of the 3rd ACM Conference on Computer and Communications Security (New York: ACM Press) p. 88.

同被引文献15

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部