高效的量子有序多重签名协议
[1] Harn L. New digital signature scheme based on discrete logarithm[J]. Electronics Letters, 1994, 30(5): 396-398.
[2] Tzongchen W, Shulin C, Tzong-sun W. Two-based multisignature protocols for sequential and broadcasting architecture[J]. Computer Communications, 1996, 19(9/10): 851-856.
[3] Shor P W. Algorithms for quantum computation: Discrete logarithms and factoring[C]. Proceedings of Annual IEEE Symposium on Foundations of Computer Science, 1994: 124-134.
[4] Grover L K. A fast quantum mechanical algorithm for database search[C]. Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, 1996: 212-219.
[5] Zeng G, Ma W, Wang X, et al. Signature scheme based on quantum cryptography[J]. Acta Electronica Sinica (电子学报), 2001, 29(8): 1098-1100 (in Chinese).
[6] Gottesman D, Chuang I. Quantum digital signatures[OL]. http://www.arXiv preprint quant-ph/0105032, 2001.
[7] Lee H, Hong C, Kim H, et al. Arbitrated quantum signature scheme with message recovery[J]. Physics Letters A, 2004, 321(5): 295-300.
[8] Wen X J, Liu Y, Sun Y. Quantum multi-signature protocol based on teleportation[J]. Zeitschrift fur Naturforschung A, 2014, 62(62): 147-151.
[9] Zuo H, Zhang K, Song T. Security analysis of quantum multi-signature protocol based on teleportation[J]. Quantum Information Processing, 2013, 12(7): 2343-2353.
[10] Wen X J, Liu Y. A realizable quantum sequential multi-signature scheme[J]. Acta Electronica Sinica (电子学报), 2007, 35(6): 1079-1083 (in Chinese).
[11] Wen X, Liu Y, Zhou N. Realizable quantum broadcasting multi-signature scheme[J]. International Journal of Modern Physics B, 2008, 22(24): 4251-4259.
[12] Wen X J, Niu X M, Ji L P, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications, 2009, 282(4): 666-669.
[13] Ying M, Wei Jian T, Yang Yu F. A Controllable Quantum Sequential Multi-Signature Scheme[M]. Springer Berlin Heidelberg, 2011: 40-45.
[14] Tian Y, Chen H, Ji S, et al. A broadcasting multiple blind signature scheme based on quantum teleportation[J]. Optical and Quantum Electronics, 2014, 4(6): 769-777.
[15] Shi J, Shi R, Tang Y, et al. A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform[J]. Quantum Information Processing, 2011, 10(5): 653-670.
[16] Hsu J L, Chong S K, Hwang T, et al. Dynamic quantum secret sharing[J]. Quantum Information Processing, 2013, 12(1): 331-344.
[17] Wen X, Tian Y, Ji L, et al. A group signature scheme based on quantum teleportation[J]. Physica Scripta, 2010, 81(5): 055001.
[18] Wen X, Liu Y, Zhang P. Digital multi-signature based on the controlled quantum teleportation[J]. Wuhan University Journal of Natural Sciences, 2007, 12(1): 29-32.
[19] Wen X J, Liu Y. Secure authentic digital signature scheme using quantum fingerprinting[J]. Chinese Journal of Electronics (量子电子学报), 2008, 17(2): 340-344 (in Chinese).
[20] Hwang T, Luo Y P, Chong S K. Comment on “Security analysis and improvements of arbitrated quantum signature schemes”[J]. Physical Review A, 2012, 85(5): 056301.
杜成斌, 石润华, 仲红, 崔杰, 张顺, 许艳. 高效的量子有序多重签名协议[J]. 量子电子学报, 2016, 33(3): 329. DU Chengbin, SHI Runhua, ZHONG Hong, CUI Jie, ZHANG Shun, XU Yan. Efficient quantum sequential multi-signature protocol[J]. Chinese Journal of Quantum Electronics, 2016, 33(3): 329.