[1] Liu Linyao, Hu Mengjun, et al. Quantum key distribution protocol based on any Bell state[J].
Chinese Journal of Quantum Electronics£tf>f?_¤§2013, 30(4):439-444£in Chinese¤.
[2] Zhou Yuanyuan, Li Xiaoqiang, Zhou Xuejun. BB84-decoy-state quantum key distribution with
a heralded single photon source[J]. Chinese Journal of Quantum Electronics£tf>f?_¤,
2010, 27(5):565-572£in Chinese¤.
[3] Zhou N R, Zeng G H, Zeng W J, et al. Crooss-center quantum identification scheme based on
teleportation and entanglement swapping[J]. Opt.Commun, 2005, 254:380-388.
[4] Shor P W and Preskill J. Simple proof of security of the BB84 Quantum key distribution protocol[
J]. Phys.Rev.Lett., 2000, 85:441-444.
[5] Zhou Jian,Yang Ming. Nearly deterministic controlled teleportation for photonic qubit via weak
cross-kerr nonlinearity[J].Chinese Journal of Quantum Electronics£tf>f?_¤,2011,
28(3):350-356(in Chinese).
[6] He Guangping. Secure quantum bit commitment against empty promises[J], Phy.Rev.A., 2006,
74:022332.
6
[7] Bechmann-Pasquinucci H. Quantum seals[J]. Int.J.Quant.Inform., 2003,1:217.
[8] He Guangping. Upper bounds of a class of imperfect quantum sealing protocols[J]. Phy.Rev.A.,
2005, 71:054304
[9] Singh S K, Srikanth R. Quantum seals[J]. Phys.Scr., 2005, 71:433.
[10] Bechmann-pasquinucci H, D’Ariano G M, Macchiavello C. Impossibility of perfect quantum sealing
of classical information[J]. Int.J.Quant.Inform., 2005, 3:435.
[11] He Guangping. Quantum Information Mad Easy[M]. Beijing:Sience Press, 2012 ,86-87.
|