[1]Chaum D. Blind signatures for untraceable payments[C]//Advances in cryptology. Springer US, 1983: 199-203.
[2]Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages[J]. IEICE transactions on fundamentals of electronics, communications and computer sciences, 1996, 79(9): 1338-1354.
[3]Chien H Y, Jan J K, Tseng Y M. RSA-based partially blind signature with low computation[C]//Parallel and Distributed Systems, 2001. ICPADS 2001. Proceedings. Eighth International Conference on. IEEE, 2001: 385-389.
[4]Traore J.Group signatures and the irrelevance to privacy-protecting off-line electronic cash systems[C]//LNCS 1587:Australasian Conference on Information Security and Privacy,ACISP’99. [S.l.]:Springer-Verlag,1999:228-243.
[5]Jeong I R, Lee D H, Lim J I. Efficient transferable cash with group signatures[M]//Information Security. Springer Berlin Heidelberg, 2001: 462-474.
[6]Maitland G, Boyd C. Fair electronic cash based on a group signature scheme[M]//Information and Communications Security. Springer Berlin Heidelberg, 2001: 461-465.
[7]Zeng G, Ma W, Wang X, et al.Signature scheme based on quantum cryptography[J].Acta Electronica Sinica, 2001, 29(8):1098-1100.
[8]Zeng G, Keitel C H. Arbitrated quantum-signature scheme[J]. Physical review A, 2002, 65(4): 042312.
[9]Lee H, Hong C, Kim H, et al. Arbitrated quantum signature scheme with message recovery[J]. Physics Letters A, 2004, 321(5): 295-300.
[10]Lü X, Feng D G. An arbitrated quantum message signature scheme[M]//Computational and Information Science. Springer Berlin Heidelberg, 2005: 1054-1060.
[11]Wen X J, Liu Y, Sun Y. Quantum multi-signature protocol based on teleportation[J]. Zeitschrift fur Naturforschung A, 2007, 62(3/4): 147.
[12]Wen X J, Liu Y. Secure authentic digital signature scheme using quantum fingerprinting[J]. Chinese Journal of Electronics, 2008, 17(2): 340-344.
[13]Wen X J, Liu Y. A realizable quantum sequential multi-signature scheme[J]. Dianzi Xuebao(Acta Electronica Sinica), 2007, 35(6): 1079-1083.
[14]Wen X J, Niu X M, Ji L P, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications, 2009, 282(4): 666-669.
[15]Chen Y Z, Liu Y, Wen X J. A quantum proxy weak blind signature scheme[J]. Chinese Journal of Quantum Electronics,2011,28(3):341-349 .
[16]Wen X J, Chen Y Z, Fang J B. An inter-bank E-payment protocol based on quantum proxy blind signature[J]. Quantum information processing, 2013, 12(1): 549-558.
[17]Cao H J, Zhu Y Y, Li P F. A quantum proxy weak blind signature scheme[J]. International Journal of Theoretical Physics, 2014, 53(2): 419-425.
[18]Yang C W, Hwang T, Luo Y P. Enhancement on “quantum blind signature based on two-state vector formalism”[J]. Quantum information processing, 2013, 12(1): 109-117.
[19]Zuo H J. Cryptanalysis of quantum blind signature scheme[J]. International Journal of Theoretical Physics, 2013, 52(1): 322-329.
[20]Zou X F, Qiu D W. Attack and improvements of fair quantum blind signature schemes[J]. Quantum information processing, 2013, 12(6): 2071-2085. |