[1]Du?ek M, Haderka O, Hendrych M, et al.Quantum identification system[J].Physical Review A, 1999, 60(1):149- 149[2]Zeng G, Zhang W.Identity verification in quantum key distribution[J].Physical Review A, 2000, 61(2):22303-22303[3]Takashi, Mihara.Quantum identification schemes with entanglements[J].Physical Review A, 2002, 65(5):52326-52326[4]Boyer M, Kenigsberg D, Mor T.Quantum key distribution with classical Bob[J].Physical Review Letters, 2007, 99(14):140501-140501[5]Jiang S Q, Zhou R G, Hu W W.Semi-quantum mutual identity authentication using Bell states[J].International Journal of Theoretical Physics, 2019, 60(0):3353-3362[6]Zhou N R, Zhu K N, Bi W, et al.Semi-quantum identification[J].Quantum Information Processing, 2019, 18(6):1-17[7]Zhou N R, Zhu K N, Zou X F.Multi-party semi-quantum key distribution protocol with four-particle cluster states [J].An-nalen Der Physik, 2019, 531(8):1800520-1800520[8]Krawec W O.Restricted attacks on semi-quantum key distribution protocols[J].Quantum Information Processing, 2014, 13(11):2417-2436[9]Zou X F, Qiu D W, Li L Z, et al.Semi-quantum key distribution using less than four quantum states[J].Physical Review A, 2009, 79(5):052312-052312[10]Yang C.Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack[J].Quantum Information Processing, 2020, 19(2):50-50[11]Gu J, Lin P, Hwang T.Double C-NOT attack and counterattack on ‘Three-step semi-quantum secure direct communication protocol.’[J].Quantum Information Processing,, 2018, 17(7):182-182[12]Li Q, Chan W H, Long D Y.Semi-quantum secret sharing using entangled states[J].Physical Review A, 2010, 82(2):022303-022303[13]Tsai C, Chang Y, Lai Y, et al.Cryptanalysis of limited resource semi-quantum secret sharing[J].Quantum Information Processing, 2020, 19(8):224-224[14]Xie C, Li L Z, Qiu D W.A novel semi-quantum secret sharing scheme of specific bits[J].International Journal of Theoretical Physics, 2015, 54(10):3819-3824[15]Boyer M, Gelles R, Kenigsberg D, et al.Semi-quantum key distribution[J].Physical Review A, 2009, 79(3):1-12[16]Zhang S, Chen Z K, Shi R H, et al.A novel quantum identity authentication based on bell states[J].International Journal of Theoretical Physics, 2020, 59(5):1-14[17]Wu J Z, Yan L.Quantum Key Distribution Protocol Based on GHZ Like State and Bell State[J].Lect Notes Comput Sci, 2020, 12240(0):298-306[18]Kang M S, Heo J, Hong C H.Controlled mutual quantum entity authentication with an untrusted third party [J].Quantum Information Processing, 2018, 17(7):159-159[19]Chen Z Y, Zhou K L, Liao Q.Quantum identity authentication scheme of vehicular ad-hoc networks[J].International Journal of Theoretical Physics, 2018, 58(6):40-57[20]Zawadzki P.Quantum identity authentication without entanglement[J].Quantum Information Processing, 2019, 18(7):1-12[21]Zhu H, Wang L, Zhang Y.An efficient quantum identity authentication key agreement protocol without entanglement[J].Quantum Information Processing, 2020, 19(10):1-14 |