[1] Shamir A. How to share a secret [J]. Communications of the ACM, 1979, 22(11): 612~613.
[2] Blakely G. Safeguarding cryptographic keys [C]. Proceedings of the National Computer Conference. NewYork: AFIPS Press, 1979, 313~317.
[3] Hillery M, Buzěk V, Berthiaume A. Quantum secret sharing [J]. Phys. Rev. A, 1999, 59: 1829~1834.
[4] Karlsson A, Koashi M, Imoto N. Quantum entanglment for secret sharing and secret splitting [J]. Phys. Rev. A, 1999, 59:162~169.
[5] Hsu L Y. Quantum secret-sharing protocol based Grover’s algorithm [J]. Phys. Rev. A, 2003, 68: 022306.
[6] Karimipour V, Bahraminasab A, Bagherinezhad S. Entanglement swapping of generalized cat states and secrsharing [J]. Phys. Rev. A, 2002, 65: 042320.
[7] Bandyopadhyay S. Teleportation and secret sharing with pur entangled states [J]. Phys. Rev. A, 2000, 62: 012308.
[8] Guo F Z, Wen Q Y, Zhu F C. Quantum scret sharing based on multi-particle entanglement [J]. The Journal of China Universities of Posts and Telecommunications, 2005, 12(1): 15219.
[9] Ljuuggren D, Bourennane M, Karlsson A. Authority-based user authentication in quantum key distribution [J]. Phys. Rev. A, 2000, 62: 022305.
[10] Zhang Z J, Yong L, Man Z X. Multiparty quantum secret sharing [J]. Phys. Rev. A, 2005, 71: 044301.
[11] Aspect A, Dalibard J, Roger G. Experimental test of Bell’s inequalities using time-varying analyzers [J]. Phys. Rev. Lett. , 1982, 49:1804~1806.
[12] Clauser J F, Horne M A, Shimony A, et al. Proposed experiment to test local hidden-variable theories [J]. Phys. Rev. Lett. , 1969, 23: 880~884.
[13] Yang W. Studay on Quantum Teleportation and Quantum Secret Sharing [D]. Master Degree Theses of Hunan University.2006(in Chinese).
[14] Zeng G H. Quantum Cryptography [M]. BeiJin: Science Press,2006(in Chinese).
[15] Liu Y Q. Research and development tend of quantum cryptography [J]. Communications Technology(通信技术).2007,40(11):324-326(in Chinese).
[16] Liu Y Q, Zhang K. Quantum authentication protocols based on entanglement swapping [J]. Natural Science Edition Journal of Huaiyin Teachers College(淮阴师范学院学报(自然科学版)).2008(7)1:69-71(in Chinese).
[17] Liu Y Q, Zhang K. Quantum authentication protocols based on entanglement swapping in distributed network [J]. Computer Engineering and Applications(计算机工程与应用),2008,44(32):90-92(in Chinese).
[18] Shi J, Zhan Y B. Probabilistic remote preparation of a bipartite three-dimensional equatorial entangled state [J].Chinese Journal of Quantum Electronics(量子电子学报),2008(25)3:307-311(in Chinese).
|