2021
DOI: 10.1007/s11128-021-03162-5
|View full text |Cite
|
Sign up to set email alerts
|

A practical quantum designated verifier signature scheme for E-voting applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(7 citation statements)
references
References 55 publications
0
7
0
Order By: Relevance
“…Only the designated verifier is able to validate the signature in the scheme. Zheng et al [9] presented a scheme that can be deployed over the existing quantum key distribution networks without complex quantum operations. The correlated key strings are generated by the use of the scheme protecting the communication against potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…Only the designated verifier is able to validate the signature in the scheme. Zheng et al [9] presented a scheme that can be deployed over the existing quantum key distribution networks without complex quantum operations. The correlated key strings are generated by the use of the scheme protecting the communication against potential eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…And in the meantime, our scheme can resist inter-resending attacks and impersonation attacks. The scheme in [31] need not any third party, while in the similar schemes in reference [26], [27], [29] and [30], the third participants must be absolutely trusted, which is a strong assumption in the virtual network. Therefore, our STQDVS scheme can be a scheme with weak trust assumption.…”
Section: Discussion and Comparisonsmentioning
confidence: 99%
“…Zheng et al have designed a new QDVS by combining the underlying quantum key distribution and the QDVS ideas [30], in which the eavesdropping behavior in the process of communication can be effectively detected. In the veri cation step of their scheme, the DV believed the signature was valid when the key string mismatch rate inequality was satis ed, so the veri cation result was probabilistic.…”
Section: Introductionmentioning
confidence: 99%
“…Quantum networking and communication technologies such as QKD (Section 2.4) have matured significantly over the past several decades, as evidenced by the ever‐increasing number of commercial players in the field (Section 2.4.4). Initial applications have been largely geared toward enhanced security for industries such as banking, [ 12 ] communication, [ 13 ] election systems, [ 14 ] and the military, [ 15 ] among others.…”
Section: Introductionmentioning
confidence: 99%