1. William, S.: Cryptography and Network Security: Principles and Practice, 2nd edn. Prentice Hall, New York (2003)
2. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring, pp. 124–134 (1994)
3. Zeng, G.H., Ma, W.P., Wang, X.M., et al.: Signature scheme based on quantum cryptography. Acta Electron. Sin. 29(8), 1098–1100 (2001)
4. Lee, H., Hong, C., Kim, H., et al.: Arbitrated quantum signature scheme with message recovey. Phys. Lett. A 321(5–6), 295–300 (2004)
5. Wen, X.J., Liu, Y., Zhang, P.Y.: Digital multi-signature protocol based on teleportation. Wuhan Univ. J. Nat. Sci. 12(1), 29–32 (2007)