Write, autoreview, editor, reviewer
3,129
edits
No edit summary |
|||
Line 144: | Line 144: | ||
==Further Information== | ==Further Information== | ||
Like most other classical digital signature schemes which provide unconditional security, this scheme also requires a trusted arbitrator who distributes public key to the recipients. This protocol was preceded by a few other protocols which use an arbitrator to establish quantum digital signatures, which used entangled states. | Like most other classical digital signature schemes which provide unconditional security, this scheme also requires a trusted arbitrator who distributes public key to the recipients. This protocol was preceded by a few other protocols which use an arbitrator to establish quantum digital signatures, most of which used entangled states. | ||
#[https://arxiv.org/abs/quant-ph/0109007 Zeng and Keitel (2002)] | |||
#[https://arxiv.org/abs/quant-ph/0511224 Wang et al (2005)] | |||
#[https://iopscience.iop.org/article/10.1088/0253-6102/68/3/317/meta Li et al (2017)] | |||
==References== | ==References== | ||
#[https://arxiv.org/abs/quant-ph/0003059 BR (2000)] | #[https://arxiv.org/abs/quant-ph/0003059 BR (2000)] | ||
#[https://www.sciencedirect.com/science/article/pii/S0378437106010119 Zhou et al. (2006)] | #[https://www.sciencedirect.com/science/article/pii/S0378437106010119 Zhou et al. (2006)] | ||
<div style='text-align: right;'>''*contributed by Rhea Parekh''</div> | <div style='text-align: right;'>''*contributed by Rhea Parekh''</div> |