Shamir A. How to share a secret[J]. Communications of the ACM, 1979, 22(11): 612-613.
[2]
Blakley G. Safeguarding cryptographic keys//Proceedings of National Computer Conference. New York: AFIPS Press, 1979: 313-317.
[3]
Bennett C H, Brassard G. Quantum cryptography: public key distribution and coin tossing//Proceedings of IEEE International Conference on Computers, Systems and Signal Processing. India: Bangalore Press, 1984: 175-179.
[4]
Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography[J]. Rev Mod Phys, 2002, 74(1): 145-195.
[5]
温巧燕, 高飞, 朱甫臣. 量子密钥分发中的身份认证问题的研究现状及分析[J]. 北京邮电大学学报, 2004, 27(5): 1-6. Wen Qiaoyan, Gao Fei, Zhu Fuchen. Study of identification in quantum key distribution[J]. Journal of Beijing University of Posts and Telecommunications, 2004, 27(5): 1-6.
[6]
Hillery M, Buek V, Berthiaume A. Quantum secret sharing[J]. Phys Rev A, 1999, 59(3): 1829-1834.
[7]
Cleve R, Gottesman D, Lo H. How to share a quantum secret[J]. Phys Rev Lett, 1999, 83(3): 648-651.
[8]
Lin Song, Gao Fei, Guo Fenzhou,et al. Comment on "multiparty quantum secret sharing of classical messages based on entanglement swapping"[J]. Phys Rev A, 2007, 76(3): 036301-1-036301-3.