[1] Chen Hui, Zhu Shixiong, Zhu Fuchen. Introduction of quantum private communication [M].Beijing: Beijing Institute of Technology Press(北京:北京理工大学出版社), 2010.1: 86-104,86, 100 (in Chinese).
[2] Dai Kui, Song Hui, et al. Introduction of technology of quantum information [M]. Changsha: National University of Defense Technology Press (长沙:国防科技大学出版社), 2001.3: 65-67 (in Chinese).
[3] Chen Hui, Zhu Fuchen. A QKD and QA protocol through once quantum communication [J]. Communications Technology (通信技术), 2003, 6 (in Chinese).
[4] Zhou Chunyuan, Wu Guang, Chen Xiuliang, et al. Quantum private communication in 50 kilometer fiber [J]. Science in China (Series G: Physics, Mechanics & Astronomy) (中国科学G辑: 物理学 力学 天文学), 2003, 33 (6): 538-543 (in Chinese).
[5] Wang Chuan, Zhang Jingfu, Wang Pingxiao. Quantum cryptography communication experiment in free space [J]. Science in China (Series G: Physics, Mechanics & Astronomy) (中国科学G辑: 物理学 力学 天文学), 2005, 35 (2): 149-157 (in Chinese).
[6] Deng FuGuo, Long Guilu, Liu Xiaoshu. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block [J]. Phys. Rev. A, 2003, 68: 042317.
[7] Deng Fuguo,Long Guilu. Secure direct communication with a quantum one-time pad [J]. Phys. Rev. A, 2004, 69: 052319.
[8] Lucamarini M, Mancini S. Secure deterministic communication without entanglement [J]. Phys. Rev. Lett., 2005, 94: 140501.
[9] Wang Chuan, Deng Fuguo, Li Yansong, et al. Quantum secure direct communication with high-dimension quantum superdense coding [J]. Phys. Rev. A, 2005, 71: 044305.
[10] Wang Chuan, Deng Fuguo, Long Guilu. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state [J]. Opt Commun, 2005, 253: 15-20.
[11] Gu Bin, Pei ShiXin, Song Biao, & Zhong Kun. Deterministic secure quantum communication over a collective-noise channel [J]. Science in China (Series G: Physics, Mechanics & Astronomy) (中国科学G辑: 物理学 力学 天文学), 2005, 52(12): 1913-1918.
[12] Bennett C H, Brassard G, Crepeau C, et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels [J]. Phys. Rev. Lett., 1993, 70: 1895-1899.
[13] Deng Fuguo, Li Chunyan, Li Yansong, Zhou Hongyu,& Wang Yan. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement [J]. Phys. Rev. A, 2005, 72, 022338.
[14] Hong Zhihui, Nie Yiyou, Huang Yibin, et al. Controlled quantum teleportation via four particle cluster states [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2008, 25(4): 458-461 (in Chinese).
[15] Li Yuanhua, Liu Junchang, Nie Yiyou. Quantum identification scheme of cross-center based on four-particle cluster state [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2011, 28(1): 52-57 (in Chinese).
[16] Wang Yong, Fan Junbo, Wangwei. Precaution of man-in-the-middle attack during quantum key distribution [J]. Netinfo Security (信息网络安全), 2004, 7 (in Chinese).
[17] Zhou Rui, Zhu Yulan, Nie Yiyou, Huang Yibin. Quantum signature protocol partly depending on arbitrage [J]. Chinese Journal of Quantum Electronics (量子电子学报), 2009, 26(4): 442-445 (in Chinese).
[18] Zhao Shengmei, Li Fei, Zheng Baoyu. The Security of Quantum Key Distribution under Probabilistic Clone/Resend Attack [J]. Journal of Electronics & Information Technology (电子与信息学报), 2005, 10 (in Chinese). |