Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ke-Jia Zhang is active.

Publication


Featured researches published by Ke-Jia Zhang.


Quantum Information Processing | 2013

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party

Wei-Wei Zhang; Ke-Jia Zhang

Recently, a quantum private comparison (QPC) protocol with a dishonest third party (TP) (Yang et al. in Quantum Inf Process, 2012. doi:10.1007/s11128-012-0433-4) was proposed, which pointed out that the assumption of semi-honest third party (TP) is unreasonable. Here we find this protocol is not so secure as it was expected, and then we give some improvement strategies, which ensure that both players’ secrets will not be leaked to anyone. We also discuss the assumption for TP in QPC protocls, which gives a constructive suggestions for the design of a new QPC protocol.


Quantum Information Processing | 2013

Improving the security of arbitrated quantum signature against the forgery attack

Ke-Jia Zhang; Wei-Wei Zhang; Dan Li

As a feasible model for signing quantum messages, some cryptanalysis and improvement of arbitrated quantum signature (AQS) have received a great deal of attentions in recent years. However, in this paper we find the previous improvement is not suitable implemented in some typical AQS protocols in the sense that the receiver, Bob, can forge a valid signature under known message attack. We describe the forgery strategy and present some corresponding improved strategies to stand against the forgery attack by modifying the encryption algorithm, an important part of AQS. These works preserve the merits of AQS and lead some potential improvements of the security in quantum signature or other cryptography problems.


Quantum Information Processing | 2013

Security analysis of quantum multi-signature protocol based on teleportation

Hui-Juan Zuo; Ke-Jia Zhang; Ting-Ting Song

The security of the recent quantum multi-signature protocol based on teleportation is analyzed. We show that there are some security vulnerabilities in the protocol. The detailed attack strategies are described from the aspect of participant attack. We also point out that the protocol is not secure against external attack. Finally, we give some possible countermeasures to improve the protocol.


Quantum Information Processing | 2013

Reexamination of arbitrated quantum signature: the impossible and the possible

Ke-Jia Zhang; Su-Juan Qin; Ying Sun; Ting-Ting Song; Qi Su

As a new model for signing both quantum and classical messages, the arbitrated quantum signature (AQS) protocols have recently attracted a lot of attentions. In this paper, we analyze their security from an important security aspect—the receiver’s forgery of the signature, and provide a detailed proof of the fact that the attempt to design an improved optimal encryption used in AQS cannot prevent the receiver’s forgery attack unless some assistant security strategies are introduced. In order to show that, we firstly summarize an explicit formalization of the general AQS model and propose the necessary and sufficient conditions against the receiver’s forgery attack. Then a contradiction of them has been pointed out. In order to complete our security analysis, we verify that the AQS protocols for signing classic messages are still susceptible to the receiver’s forgery. Finally, some assistant security strategies are provided to recover the security.


Quantum Information Processing | 2013

A quantum protocol for millionaire problem with Bell states

Wei-Wei Zhang; Dan Li; Ke-Jia Zhang; Hui-Juan Zuo

We propose a quantum protocol for the millionaire problem with Bell states, where two distrustful parties can compare the values of their fortune with the help of a semi-dishonest third party. The efficiency of our protocol is higher than that of previous protocols for millionaire problem. In our protocol, any information about the values of their fortune will not be leaked out. The security of our protocol is also discussed.


Quantum Information Processing | 2015

A novel quantum group signature scheme without using entangled states

Guang-Bao Xu; Ke-Jia Zhang

In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.


International Journal of Theoretical Physics | 2015

Quantum Walks on Two Kinds of Two-Dimensional Models

Dan Li; Michael Mc Gettrick; Wei-Wei Zhang; Ke-Jia Zhang

In this paper, we numerically study quantum walks on two kinds of two-dimensional graphs: cylindrical strip and Mobius strip. The two kinds of graphs are typical two-dimensional topological graph. We study the crossing property of quantum walks on these two models. Also, we study its dependence on the initial state, size of the model. At the same time, we compare the quantum walk and classical walk on these two models to discuss the difference of quantum walk and classical walk.


International Journal of Theoretical Physics | 2016

A Novel Quantum Blind Signature Scheme with Four-particle GHZ States

Ling Fan; Ke-Jia Zhang; Su-Juan Qin; Fen-Zhuo Guo


International Journal of Theoretical Physics | 2015

Cryptanalysis of a Quantum Proxy Weak Blind Signature Scheme

Ke-Jia Zhang; Heng-Yue Jia


International Journal of Theoretical Physics | 2014

Security Weaknesses in Arbitrated Quantum Signature Protocols

Feng Liu; Ke-Jia Zhang; Tianqing Cao

Collaboration


Dive into the Ke-Jia Zhang's collaboration.

Top Co-Authors

Avatar

Wei-Wei Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Dan Li

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Hui-Juan Zuo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ting-Ting Song

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Fen-Zhuo Guo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Su-Juan Qin

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Ying Sun

Beijing Electronic Science and Technology Institute

View shared research outputs
Top Co-Authors

Avatar

Feng Liu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Guang-Bao Xu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Heng-Yue Jia

Central University of Finance and Economics

View shared research outputs
Researchain Logo
Decentralizing Knowledge