22
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      An efficient and provably secure arbitrated quantum signature scheme

      Preprint
      , , , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          In this paper, an efficient arbitrated quantum signature scheme is proposed by combining quantum cryptographic techniques and some ideas in classical cryptography. In the presented scheme, the signatory and the receiver can share a long-term secret key with the arbitrator by utilizing the key together with a random number. While in previous quantum signature schemes, the key shared between the signatory and the arbitrator or between the receiver and the arbitrator could be used only once, and thus each time when a signatory needs to sign, the signatory and the receiver have to obtain a new key shared with the arbitrator through a quantum key distribution protocol. Detailed theoretical analysis shows that the proposed scheme is efficient and provably secure.

          Related collections

          Most cited references17

          • Record: found
          • Abstract: found
          • Article: found
          Is Open Access

          Simple Proof of Security of the BB84 Quantum Key Distribution Protocol

          We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement-purification based protocol uses Calderbank-Shor-Steane (CSS) codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Conjugate coding

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Quantum entanglement for secret sharing and secret splitting

                Bookmark

                Author and article information

                Journal
                03 June 2008
                2011-07-11
                Article
                0806.0557
                dd386d7c-5f40-4a4f-a7fe-32bd22e6cc43

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                some contents changed, 12 pages
                quant-ph cs.CR

                Comments

                Comment on this article