[1]Harn L.New digital signature scheme based on discrete logarithm[J].Electronics Letters, 1994, 30(5):396-398[2]Tzongchen W, Shulin C, Tzong-sun W.Two-based multisignature protocols for sequential and broadcasting architecture[J].Computer Communications, 1996, 19(910):851-856[3]Shor P W.Algorithms for quantum computation: Discrete logarithms and factoring[C]//Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on. IEEE, 1994: 124-134.[4]Grover L K.A fast quantum mechanical algorithm for database search[C]//Proceedings of the twenty-eighth annual ACM symposium on Theory of computing. ACM, 1996: 212-219.[5]Zeng G, Ma W, Wang X, et al.Signature scheme based on quantum cryptography[J].Acta Electronica Sinica, 2001, 29(8):1098-1100[6]Gottesman D, Chuang I.Quantum digital signatures[J].arXiv preprint quant-ph, 2001, 00(00):00-00[7]Lee H, Hong C, Kim H, et al.Arbitrated quantum signature scheme with message recovery[J].Physics Letters A, 2004, 321(5):295-300[8]Wen X J, Liu Y, Sun Y.Quantum multi-signature protocol based on teleportation[J].Zeitschrift fur Naturforschung A, 2007, 62(34):147-157[9]Wen X J, Liu Y.Secure authentic digital signature scheme using quantum fingerprinting[J].Chinese Journal of Electronics, 2008, 17(2):340-344[10]Wen X J, Liu Y.A realizable quantum sequential multi-signature scheme[J].Dianzi Xuebao(Acta Electronica Sinica), 2007, 35(6):1079-1083[11]Wen X, Liu Y, Zhang P.Digital multi-signature based on the controlled quantum teleportation[J].Wuhan University Journal of Natural Sciences, 2007, 12(1):29-32[12]Wen X J, Niu X M, Ji L P, et al.A weak blind signature scheme based on quantum cryptography[J].Optics Communications, 2009, 282(4):666-669[13]Wen X, Tian Y, Ji L, et al.A group signature scheme based on quantum teleportation[J].Physica Scripta, 2010, 81(5):055001-055009[14]Zuo H, Zhang K, Song T.Security analysis of quantum multi-signature protocol based on teleportation[J].Quantum information processing, 2013, 12(7):2343-2353[15]Shi J, Shi R, Tang Y, et al.A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform[J].Quantum Information Processing, 2011, 10(5):653-670[16]Hsu J L, Chong S K, Hwang T, et al.Dynamic quantum secret sharing[J].Quantum information processing, 2013, 12(1):331-344[17]Ying M, Wei-Jian T, Yang-Yu F.A controllable quantum sequential multi-signature scheme[M]//Theoretical and Mathematical Foundations of Computer Science. Springer Berlin Heidelberg, 2011: 40-45.[18]Wen X, Liu Y, Zhou N.Realizable quantum broadcasting multi-signature scheme[J].International Journal of Modern Physics B, 2008, 22(24):4251-4259[19]Tian Y, Chen H, Ji S, et al.A broadcasting multiple blind signature scheme based on quantum teleportation[J].Optical and Quantum Electronics, 2014, 46(6):769-777[20]Hwang T, Luo Y P, Chong S K.Comment on “Security analysis and improvements of arbitrated quantum signature schemes”[J].Physical Review A, 2012, 85(5):056301-056308 |