Lin Minhui,Chang Chinchen,Chen Yanren. A fair and secure mobile agent environment based on blind signature and proxy host[J]. Computers & Security ,2004, 23, 199-212.?
[2]
Chen Yuyi,Jan Jinnke,Chen Chinling. The design of a secure anonymous Internet voting system[J]. Computers & Security ,2004,23, 330-337.?
[3]
Gu Lize,Zhang Sheng,Yang Yixian.Proxy blind signature scheme and its application to electronic cash[J]. Computer Engineering(计算机工程), 2005,31(16):11-13 (in Chinese). [4] Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages[J]. IEICE Transactions on Fundamentals, 1996,E79-A (9), 1338–1354.?
[4]
Yu Baozheng, Xu Congwei. A Proxy Blind Signature Scheme Based on DLP[J].Wuhan University Journal of Natural Sciences,2007,12(1),083-086?
[5]
Lu Rongxing, Cao Zhenfu, Zhou Yuan. Proxy blind multi-signature scheme without a secure channe[J]. Applied Mathematics and Computation, 2005,164 ,179–187.?
[6]
Zhang Jianzhong, Wang Jie,Liu Qinxi. New proxy blind signature scheme and its application in electronic cash[J]. ApplicationResearch ofComputer(计算机应用研究), 2009,26(1):347-358(in Chinese).?
[7]
Sun Hungmin, Hsieh Bintsan, Tseng Shinmu.On the security of some proxy blind signature schemes[J]. The Journal of Systems and Software ,74 (2005) 297–302.?
[8]
Zhang Xuejun. Analysis and Improvement of ID-based Proxy Blind Signature [J]. Computer Engineering(计算机工程), 2009,35(23):122-126 (in Chinese).?
[9]
Shi Shiwei,Yi Youmin.Scheme for implementation of controlled-NOT gate and quantum teleportation in a resonant cavity, [J]. Chinese Journal of Quantum Electronics,(量子电子学报 ),2009, 26(3) 301-305?
[10]
Wang Jian,Zhang Hongfei,Wan Xu, et al. Design of FPGA and USB based control board for quantum experiments[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2010, 27(1): 77-81 (in Chinese).?
[11]
Gottesman D, Chuang I.Quantum digital signatures[DB/OL]. [2001-05-08 ]. http://arxiv.org/abs/quant-ph/0105032.?
[12]
Zeng Guihua,Ma Wenping,Wang Xinmei,et a1.Signature scheme based on quantum cryptography[J].Acta Electronica Sinaca(电子学报),2001,29(8):1098-1100(in Chinese).?
[13]
Zhou Rui,Zhu Yulan,Nie Yiyou,et al. Quantum signature protocol partly depending arbitrage[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2009, 26(4): 442-445 (in Chinese).?
[14]
Wen Xiaojun,Liu Yun,Zhang Yunpeng.Information Signature Protocols Using Einstein-Podolsky-Rosen Pairs[J]. Journal of Dalian University of Technology(大连理工大学学报), 2007,47(3):424-428. (in Chinese)?
[15]
Wen Xiaojun, Liu Yun. A Realizable Quantum Sequential Multi-Signature Scheme[J].Acta Electronica Sinaca(电子学报), 2007,35(6):1079-1083(in Chinese).?
[16]
Wen Xiaojiu, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications , 2009,282 666–669.?
[17]
Gao Ting,Yan Fengli,Wang Zhixi. Controlled quantum teleportation and secure direct communication[J]. Chinese Physics,2005,14(05): 893-897.?
[18]
Zhou Yuanyuan,Li Xiaoqiang, Zhou Xuejun. Study on BB84-decoy-state quantum key distribution with a heralded single photon source, [J]. Chinese Journal of Quantum Electronics,(量子电子学报 ), 2010, 27(5) 565-572?
[19]
Wu Zhangbin,Chen Guang,Yang Bojun. Improve the performance of BBM92 quantum key distribution system[J]. Chinese Journal of Quantum Electronics(量子电子学报 ), 2009, 26(5): 560-564 (in Chinese).