[1] Chen C Y, Lin H F, Gun C Y. A novel distributed rsa blind and weakly undeniable multi-signature scheme[J]. International Journal of Innovative Computing Information and Control Ijicic, 2012, 8(10): 6975-6998. [2] Zeng G H, Ma W P, Wang X M, et al. Signature scheme based on quantum cryptography[J]. Acta Electronica Sinica, 2001, 29(8): 1098-1100. [3] Zeng G, Keitel C H. Arbitrated quantum-signature scheme[J]. Physical Review A, 2002, 65(4): 042312. [4] Lee H, Hong C, Kim H, et al. Arbitrated quantum signature scheme with message recovery[J]. Physics Letters A, 2004, 321(5): 295-300. [5] Xin L, Feng D G. An arbitrated quantum message signature scheme[J]. Lecture Notes in Computer Science, 2004, 3314: 1054-1060. [6] Wen X J, Liu Y, Sun Y. Quantum multi-signature protocol based on teleportation[J]. Zeitschrift fur Naturforschung A, 2007, 62(3/4): 147-151. [7] Wen X J, Liu Y. Secure authentic digital signature scheme using quantum fingerprinting[J]. Chinese Journal of Electronics, 2008, 17(2): 340-344. [8] Wen X J, Liu Y. A realizable quantum sequential multi-signature scheme[J]. Acta Electronica Sinica, 2007, 35(6): 1079-1083. [9] Wen X, Chen Y, Fang J. An inter-bank E-payment protocol based on quantum proxy blind signature[J]. Quantum Information Processing, 2013, 12(1): 549-558. [10] Wang Hui, Shi Runhua, Zhong Hong, et al. Sequential double quantum blind signature protocol [J]. Journal on Communications(通信学报), 2015, 36(9): 259-266(in Chinese). [11] Liang Jianwu, Wang Xiaohui, Guo Ying, et al. Blind signature scheme based on entangled quantum [J]. Journal on Communications(通信学报), 2016, 37(2): 38-42(in Chinese). [12] Chor B, Kushilevitz E, Goldreich O, et al. Private information retrieval[J]. Journal of the ACM, 1998, 45(6): 965-981. [13] Gertner Y, Ishai Y, Kushilevitz E, et al. Protecting data privacy in private information retrieval schemes[C]. Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, 1998: 151-160. [14] Chang Y, Zhang S, Han G, et al. Quantum private query protocol based on two non-orthogonal states[J]. Entropy, 2016, 18(5): 163. [15] Yang Y G, Liu Z C, Li J, et al. Quantum private query with perfect user privacy against a joint-measurement attack[J]. Physics Letters A, 2016, 380(48): 4033-4038. [16] De Martini F, Giovannetti V, Lloyd S, et al. Experimental quantum private queries with linear optics[J]. Physical Review A, 2015, 80(1): 2460-2462. [17] Gao F, Liu B, Wen Q Y, et al. Flexible quantum private queries based on quantum key distribution[J]. Optics Express, 2012, 20(16): 17411-17420. [18] Yang Y G, Sun S J, Xu P, et al. Flexible protocol for quantum private query based on B92 protocol[J]. Quantum Information Processing, 2014, 13(3): 805-813. [19] Jakobi M, Simon C, Gisin N, et al. Practical private database queries based on a quan-tum-key-distribution protocol[J]. Physical Review A, 2011, 83(2): 773-781. [20] Raynal P. Unambiguous state discrimination of two density matrices in quantum information theory[J]. Physics, 2006,(0611133). [21] Herzog U, Bergou J A. Optimum unambiguous discrimination of two mixed quantum states[J]. Physical Review A, 2005, 71(5): 362366. |