Multiparty quantum signature schemes

@article{Arrazola2016MultipartyQS,
  title={Multiparty quantum signature schemes},
  author={J. M. Arrazola and P. Wallden and E. Andersson},
  journal={Quantum Inf. Comput.},
  year={2016},
  volume={16},
  pages={435-464}
}
Digital signatures are widely used in electronic communications to secure important tasks such as financial transactions, software updates, and legal contracts. The signature schemes that are in use today are based on public-key cryptography and derive their security from computational assumptions. However, it is possible to construct unconditionally secure signature protocols. In particular, using quantum communication, it is possible to construct signature schemes with security based on… Expand
27 Citations
Unconditionally Secure Quantum Signatures
  • 29
  • PDF
Cryptanalysis of multiparty quantum digital signatures
  • 11
Measurement-device-independent quantum digital signatures
  • 26
  • PDF
Unconditionally Secure Signatures
  • 3
  • PDF
High-efficiency quantum digital signature scheme for signing long messages
  • 7
Secure and practical multiparty quantum digital signatures
  • PDF
An efficient quantum blind digital signature scheme
  • 7
  • PDF
Multi-party ring quantum digital signatures
  • 2
Efficient Unconditionally Secure Signatures Using Universal Hashing
  • 3
  • PDF
...
1
2
3
...

References

SHOWING 1-10 OF 35 REFERENCES
Quantum Digital Signatures
  • 156
  • PDF
Unconditionally Secure Digital Signature Schemes Admitting Transferability
  • 58
  • PDF
Realization of quantum digital signatures without the requirement of quantum memory.
  • 90
  • PDF
Unconditionally secure signature schemes revisited
  • 30
  • PDF
Quantum digital signatures with quantum-key-distribution components
  • 67
  • PDF
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light
  • 92
  • PDF
Quantum digital signature based on quantum one-way functions
  • Xin Lü, D. Feng
  • Physics, Computer Science
  • The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005.
  • 2005
  • 38
  • PDF
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code
  • 15
  • PDF
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"
  • 20
  • PDF
Further Results on Asymmetric Authentication Schemes
  • 32
...
1
2
3
4
...