[3] Zhou N R, Zeng G H, Zeng W J, et al. Crooss-center quantum identification scheme based on teleportation and entanglement swapping [J]. Opt. Commun., 2005, 254: 380-388.
[4] Shor P W, Preskill J. Simple proof of security of the BB8quantum key distribution protocol [J]. Phys. Rev. Lett., 2000, 85: 441-444.
[6] He Guangping. Secure quantum bit commitment against empty promises [J]. Phy. Rev. A, 2006, 74: 022332.
[7] Bechmann-Pasquinucci H. Quantum seals [J]. Int. J. Quant. Inform., 2003, 1: 217.
[8] He Guangping. Upper bounds of a class of imperfect quantum sealing protocols [J]. Phy. Rev. A, 2005, 71: 054304.
[9] Singh S K, Srikanth R. Quantum seals [J]. Phys. Scr., 2005, 71: 433.
[10] Bechmann-pasquinucci H, D’Ariano G M, Macchiavello C. Impossibility of perfect quantum sealing of classical information [J]. Int. J. Quant. Inform., 2005, 3: 435.