[1]JAN Jinnke, TAI Chihchang.A secure electronic voting protocol with IC cards[J].Journal of Systems and Software, 1997, 39(2):93-101[2]FAN C I, LEI C L.Efficient blind signature scheme based on quadratic residues[J].Electronic Letters, 1996, 32(9):811-813[3]SHOR P W, PRESKILL J.Simple proof of security of the BB84 quantum key distribution protocol[J].Physical Review Letters, 2000, 85(2):441-444[4]ZHANG Jian-hong, WU Qian-hong, ZOU Jian-cheng, WANG Yu-min.An Efficient Group Signature Scheme[J].ACTA ELECTRONICA SINICA, 2005, 33(6):1113-1115[5]WEN Xiaojun, Niu Xiamu, JI Liping, et al.A weak blind signature scheme based on quantum cryptography[J].Optics Communications, 2008, 282(4):666-669[6]WEN Xiaojun, TIAN Yuan, NIU Xiamu.A group signature scheme based on quantum teleportation[J].Physica Scripta, 2010, 81(4):55001-55005[7]WEN Xiao-jun, TIAN Yuan, NIU Xia-mu.A Strong Blind Quantum Signature Protocol Based on Secret Sharing[J].ACTA ELECTRONICA SINICA, 2009, 38(3):720-724[8]BUHRMAN H, CLEVE R, WATROUS J, et al.Quantum fingerprinting[J].Physical Review Letters, 2001, 87(16):167902-167904[9]WEN Xiao-jun, CAI Xue-jun.Secure quantum voting protocol[J].Journal of Shandong University(Natural Science), 2011, 46(9):9-13[10]HILLERY M, BUZEK V, BERTHIAUME A.Quantum secret sharing[J].Physical Review A, 1999, 59(3):1829-1834 |