[1] Jan J K, Tai C C. A secure electronic voting protocol with IC cards[J]. Journal of Systems and Software, 1997, 39(2): 93-101.
[3] Shor P W, Preskili J. Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical Review Letters, 2000, 85(2): 441-444.
[5] Wen Xiaojun, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography[J]. Optics Communications, 2008, 282(4): 666-669.
[6] Wen Xiaojun, Tian Yuan, Niu Xiamu. A group signature scheme based on quantum teleportation[J]. Physica Scripta, 2010, 81(4): 055001.
[7] Li Yuan, Zeng Guihua. Quantum anonymous voting systems based on entangled state[J]. Optical Review, 2008, 15(5): 219-223.
[8] Li Yuan, Zeng Guihua. Anonymous quantum network voting scheme[J]. Optical Review, 2012, 19(3): 121-124.
[9] Naseri M, Gong L H, Houshmand M, et al. An anonymous surveying protocol via Greenberger-Horne-Zeilinger states[J]. International Journal of Theoretical Physics, 2016, 55(10): 4436-4444.
[11] Buhrman H, Cleve R, Watrous J, et al. Quantum fingerprinting[J]. Physical Review Letters, 2001, 87(16): 167902.
[13] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3): 1829-1834.