[1] Wiesner S. Conjugate coding [J]. Sigact News, 1983, 15(1): 78-88.
[2] Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C [M]. John Wiley and Sons Inc., 199
[3] Bennett C. Quantum cryptography using any two nonorthogonal states [J]. Phys. Rev. Lett., 1992, 68: 3121-3124.
[4] Slutsky B A, Rao R, Pang C S, et al. Security of quantum cryptography against individual attacks [J]. Phys. Rev. A, 1998, 57: 2383-2398.
[5] Bennett C H, Bessette F, Brassard G, et al. Experimental quantum cryptography [J]. J. of Cryptology, 1992, 5(1): 3-28.
[6] Biham E, Huttner B, Mor T. Quantum cryptographic network based on quantum memories [J]. Phys. Rev. A, 1996, 54: 2651-2658.
[10] Dusek M, Haderka O, Hendryeh M, et al. Quantum identification system [J]. Phys. Rev. A, 1999, 60: 149-156.
[11] Zeng G H, Guo G. Quantum key distribution relied on trusted information center [OL]. e-print archieve, quant-ph/0001045.
[13] Gottesman D, Chuang I. Quantum digital signatures[OL]. http://arxiv.org/abs/quant-ph/0105032, 2001.
[14] Zeng G, Christoph K. An arbitrated quantum signature scheme [J]. Phys. Rev. A, 2002, 65: 042312.
[15] Lee H, Hong C, Km H, et al. Arbitrated quantum signature scheme with message recovery [J]. Phys. Lett. A, 2004, 321: 295-300.
[17] Zeng G, Zhang W. Identity verification in quantum key distribution [J]. Phys. Rev. A, 2000, 61: 022303/1-5.