A design principle for hash functions
CRYPTO '89 Proceedings on Advances in cryptology
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Some attacks on quantum-based cryptographic protocols
Quantum Information & Computation
Hi-index | 0.00 |
This paper points out design confusion existing in all the arbitrated quantum signatures (AQS) that require public discussions over authenticated classical channels. Instead, an AQS scheme of classical messages without using authenticated classical channels is proposed here. A cryptographic hash function is used in combine with quantum mechanics to check the existence of an eavesdropping or to verify a signature. In addition, by using only single photons, this scheme provides higher efficiency both in quantum transmissions and generations. The proposed AQS scheme is shown to be immune to several well-known attacks, i.e., the Trojan-horse attacks and the existential forgery attack.