[1] | [J]. Communications of the ACM, 1979, 22(11): 612~613.?
|
[2] | Blakely G. Safeguarding cryptographic keys
|
[3] | [C]. Proceedings of the National Computer Conference. NewYork: AFIPS Press, 1979, 313~317.?
|
[4] | Hsu L Y. Quantum secret-sharing protocol based Grover’s algorithm
|
[5] | Karimipour V, Bahraminasab A, Bagherinezhad S. Entanglement swapping of generalized cat states and secrsharing
|
[6] | Shamir A. How to share a secret
|
[7] | Hillery M, Buzěk V, Berthiaume A. Quantum secret sharing
|
[8] | [J]. Phys. Rev. A, 1999, 59: 1829~1834.?
|
[9] | Karlsson A, Koashi M, Imoto N. Quantum entanglment for secret sharing and secret splitting
|
[10] | [J]. Phys. Rev. A, 1999, 59:162~169.?
|
[11] | [J]. Phys. Rev. A, 2003, 68: 022306.?
|
[12] | [J]. Phys. Rev. A, 2002, 65: 042320.?
|
[13] | Bandyopadhyay S. Teleportation and secret sharing with pur entangled states
|
[14] | [J]. Phys. Rev. A, 2000, 62: 012308.?
|
[15] | Guo F Z, Wen Q Y, Zhu F C. Quantum scret sharing based on multi-particle entanglement
|
[16] | [J]. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 15219.?
|
[17] | Ljuuggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution
|
[18] | [J]. Phys. Rev. A, 2000, 62: 022305.?
|
[19] | Zhang Z J, Yong L, Man Z X. Multiparty quantum secret sharing
|
[20] | [J]. Phys. Rev. A, 2005, 71: 044301.?
|
[21] | Aspect A, Dalibard J, Roger G. Experimental test of Bell’s inequalities using time-varying analyzers
|
[22] | [J]. Phys. Rev. Lett. , 1982, 49:1804~1806.?
|
[23] | Clauser J F, Horne M A, Shimony A, et al. Proposed experiment to test local hidden-variable theories
|
[24] | [J]. Phys. Rev. Lett. , 1969, 23: 880~884.?
|
[25] | Yang W. Studay on Quantum Teleportation and Quantum Secret Sharing
|
[26] | [D]. Master Degree Theses of Hunan University.2006(in Chinese).
|
[27] | ?
|
[28] | Zeng G H. Quantum Cryptography
|
[29] | [M]. BeiJin: Science Press,2006(in Chinese).?
|
[30] | Liu Y Q. Research and development tend of quantum cryptography
|
[31] | [J]. Communications Technology(通信技术).2007,40(11):324-326(in Chinese).?
|
[32] | Liu Y Q, Zhang K. Quantum authentication protocols based on entanglement swapping
|
[33] | [J]. Natural Science Edition Journal of Huaiyin Teachers College(淮阴师范学院学报(自然科学版)).2008(7)1:69-71(in Chinese).?
|
[34] | Liu Y Q, Zhang K. Quantum authentication protocols based on entanglement swapping in distributed network
|
[35] | [J]. Computer Engineering and Applications(计算机工程与应用),2008,44(32):90-92(in Chinese).?
|
[36] | Shi J, Zhan Y B. Probabilistic remote preparation of a bipartite three-dimensional equatorial entangled state
|
[37] | [J].Chinese Journal of Quantum Electronics(量子电子学报),2008(25)3:307-311(in Chinese).
|