[1] Lin Minhui, Chang Chinchen, Chen Yanren. A fair and secure mobile agent environment based on blind signature and proxy host [J]. Computers and Security, 2004, 23, 199-212.
[2] Chen Yuyi, Jan Jinnke, Chen Chinling. The design of a secure anonymous Internet voting system [J]. Computers and Security, 2004, 23, 330-337.
[4] Mambo M, Usuda K, Okamoto E. Proxy signatures: delegation of the power to sign messages [J]. IEICE Transactions on Fundamentals, 1996, E79-A (9): 1338-1354.
[5] Yu Baozheng, Xu Congwei. A proxy blind signature scheme based on DLP [J]. Wuhan University Journal of Natural Sciences, 2007, 12(1): 083-086.
[6] Lu Rongxing, Cao Zhenfu, Zhou Yuan. Proxy blind multi-signature scheme without a secure channel [J]. Applied Mathematics and Computation, 2005,164: 179-187.
[8] Sun Hungmin, Hsieh Bintsan, Tseng Shinmu. On the security of some proxy blind signature schemes [J]. Journal of Systems and Software, 2005, 74: 297-302.
[12] Gottesman D, Chuang I. Quantum digital signatures [OL]. http://arxiv.org/abs/quant-ph/0105032.
[17] Wen Xiaojiu, Niu Xiamu, Ji Liping, et al. A weak blind signature scheme based on quantum cryptography [J]. Optics Communications, 2009, 282: 666-669.
[18] Gao Ting, Yan Fengli, Wang Zhixi. Controlled quantum teleportation and secure direct communication [J]. Chinese Physics, 2005, 14(05): 893-897.