[1] Lin Minhui,Chang Chinchen,Chen Yanren. A fair and secure mobile agent environment based on blind signature and proxy host[J]. Computers & Security ,2004, 23, 199-212.
[2] Chen Yuyi,Jan Jinnke,Chen Chinling. The design of a secure anonymous Internet voting system[J]. Computers & Security ,2004,23, 330-337.
[3] Gu Lize,Zhang Sheng,Yang Yixian.Proxy blind signature scheme and its application to electronic cash[J]. Computer Engineering(计算机工程), 2005,31(16):11-13 (in Chinese). [4] Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals, 1996,E79-A (9), 1338–1354.
[5] Yu Baozheng, Xu Congwei. A Proxy Blind Signature Scheme Based on DLP[J].Wuhan University Journal of Natural Sciences,2007,12(1),083-086
[6] Lu Rongxing, Cao Zhenfu, Zhou Yuan. Proxy blind multi-signature scheme without a secure channe[J]. Applied Mathematics and Computation, 2005,164 ,179–187.
[7] Zhang Jianzhong, Wang Jie,Liu Qinxi. New proxy blind signature scheme and its application in electronic cash[J]. ApplicationResearch ofComputer(计算机应用研究), 2009,26(1):347-358(in Chinese).
[8] Sun Hungmin, Hsieh Bintsan, Tseng Shinmu.On the security of some proxy blind signature schemes[J]. The Journal of Systems and Software ,74 (2005) 297–302.
[9] Zhang Xuejun. Analysis and Improvement of ID-based Proxy Blind Signature [J]. Computer Engineering(计算机工程), 2009,35(23):122-126 (in Chinese).
[10] Shi Shiwei,Yi Youmin.Scheme for implementation of controlled-NOT gate and quantum teleportation in a resonant cavity, [J]. Chinese Journal of Quantum Electronics,(量子电子学报 ),2009, 26(3) 301-305
[11] Wang Jian,Zhang Hongfei,Wan Xu, et al. Design of FPGA and USB based control board for quantum experiments[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2010, 27(1): 77-81 (in Chinese).
[12] Gottesman D, Chuang I.Quantum digital signatures[DB/OL]. [2001-05-08 ]. http://arxiv.org/abs/quant-ph/0105032.
[13] Zeng Guihua,Ma Wenping,Wang Xinmei,et a1.Signature scheme based on quantum cryptography[J].Acta Electronica Sinaca(电子学报),2001,29(8):1098-1100(in Chinese).
[14] Zhou Rui,Zhu Yulan,Nie Yiyou,et al. Quantum signature protocol partly depending arbitrage[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2009, 26(4): 442-445 (in Chinese).
[15] Wen Xiaojun,Liu Yun,Zhang Yunpeng.Information Signature Protocols Using Einstein-Podolsky-Rosen Pairs[J]. Journal of Dalian University of Technology(大连理工大学学报), 2007,47(3):424-428. (in Chinese)
[16] Wen Xiaojun, Liu Yun. A Realizable Quantum Sequential Multi-Signature Scheme[J].Acta Electronica Sinaca(电子学报), 2007,35(6):1079-1083(in Chinese).
[17] Wen Xiaojiu, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications , 2009,282 666–669.
[18] Gao Ting,Yan Fengli,Wang Zhixi. Controlled quantum teleportation and secure direct communication[J]. Chinese Physics,2005,14(05): 893-897.
[19] Zhou Yuanyuan,Li Xiaoqiang, Zhou Xuejun. Study on BB84-decoy-state quantum key distribution with a heralded single photon source, [J]. Chinese Journal of Quantum Electronics,(量子电子学报 ), 2010, 27(5) 565-572
[20] Wu Zhangbin,Chen Guang,Yang Bojun. Improve the performance of BBM92 quantum key distribution system[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2009, 26(5): 560-564 (in Chinese). |