[1]Stallings W. Cryptography and Network Security Principles and Practices[J]. Printice Hill Publishing Pp, 2005, volume 11(7):655-660.[2]Cao Z, Liu M. Classification of signature-only signature models[J]. Science in China Series F: Information Sciences, 2008, 51(8): 1083-1095.[3]Bennett C H, Brassard G. An update on quantum cryptography [C]// Advance in Cryptology:proceddings of Cryto84. Berlin:Springer-VerLag,1984:475-480.[4]Bennett C H. Quantum cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992, 68(21): 3121-3124.[5]Schneier B. Applied Crytography: Protocols, Algorithms, and Source Code in C.2nd ed. New York: John Wiley and Sons, 1996. 79-80.[6]Lu R X, Dong X L, Cao Z F. Designing efficient proxy signature schemes for mobile communication[J]. Science in China Series F: Information Sciences, 2008, 51(2): 183-195.[7]Sun Ying, Wen Qiaoyan, zhu Fuchen. Quantum Secure Communication Based on the Reusable Bases Sequences[J].Acta Eletronica Sinica,2010,38(1):111-116.[8]Curty M,Santos D J.Qubit authentacation[J].Phys Rev A,2002,66:022301.[9]Shiwei S, Youmin Y. Scheme for implementation of controlled-NOT gate and quantum teleportation in a resonant cavity[J]. Chinese Journal of Quantum Electronics (量子电子学报), 2009, 2(3): 301-305.[10]WANG J, ZHANG H F, WAN X, et al. Design of FPGA and USB based control board for quantum experiments[J]. Chinese Journal of Quantum Electronics, 2010, 27(1): 77-81.[11]Chuang I, Gottesman D. Quantum digital signatures: U.S. Patent 7,246,240[P]. 2007-7-17.[12]Zeng G, Ma W, Wang X, et al.Signature scheme based on quantum cryptography[J].Acta Electronica Sinica, 2001, 29(8):1098-1100.[13]Wen X, Niu X, Ji L, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications, 2009, 282(4): 666-669.[14]Yang Y G, Wen Q Y. Threshold proxy quantum signature scheme with threshold shared verification[J]. Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51(8): 1079-1088.[15]Shi J H, Zhang S L, Chang Z G. The security analysis of a threshold proxy quantum signature scheme[J]. Science China Physics, Mechanics and Astronomy, 2013, 56(3): 519-523.Buhrman H, Cleve R, Watrous J, et al. Quantum fingerprinting[J]. Physical Review Letters, 2001, 87(16): 167902-167904. |