Liu Linyao, Hu Mengjun, et al. Quantum key distribution protocol based on any Bell state[J]. Chinese Journal of Quantum Electronics£tf>f?_¤§2013, 30(4):439-444£in Chinese¤. [2] Zhou Yuanyuan, Li Xiaoqiang, Zhou Xuejun. BB84-decoy-state quantum key distribution with a heralded single photon source[J]. Chinese Journal of Quantum Electronics£tf>f?_¤, 2010, 27(5):565-572£in Chinese¤. [3] Zhou N R, Zeng G H, Zeng W J, et al. Crooss-center quantum identification scheme based on teleportation and entanglement swapping[J]. Opt.Commun, 2005, 254:380-388. [4] Shor P W and Preskill J. Simple proof of security of the BB84 Quantum key distribution protocol[ J]. Phys.Rev.Lett., 2000, 85:441-444. [5] Zhou Jian,Yang Ming. Nearly deterministic controlled teleportation for photonic qubit via weak cross-kerr nonlinearity[J].Chinese Journal of Quantum Electronics£tf>f?_¤,2011, 28(3):350-356(in Chinese). [6] He Guangping. Secure quantum bit commitment against empty promises[J], Phy.Rev.A., 2006, 74:022332. 6 [7] Bechmann-Pasquinucci H. Quantum seals[J]. Int.J.Quant.Inform., 2003,1:217. [8] He Guangping. Upper bounds of a class of imperfect quantum sealing protocols[J]. Phy.Rev.A., 2005, 71:054304 [9] Singh S K, Srikanth R. Quantum seals[J]. Phys.Scr., 2005, 71:433. [10] Bechmann-pasquinucci H, D’Ariano G M, Macchiavello C. Impossibility of perfect quantum sealing of classical information[J]. Int.J.Quant.Inform., 2005, 3:435. [11] He Guangping. Quantum Information Mad Easy[M]. Beijing:Sience Press, 2012 ,86-87.