[1]Zhang Q Y. Quantum secret sharing of single-qubit state via tripartite entangled states[J]. Chinese Journal of Quantum Electronics (量子电子学报),2012,29(4):421-426(in Chinese).张群永. 基于三粒子纠缠态的未知单粒子态量子秘密共享[J]. 量子电子学报,2012, 29(4):421-426.[2]Liu Y Q, Shi J, Hu B L. Scheme of three quantum bit secret sharing based on GHZ state[J]. Chinese Journal of Quantum Electronics (量子电子学报), 2010,27(1):41-46(in Chinese).刘岳启,施锦,胡宝林,张琨. 基于GHZ态的三个量子位秘密共享方案[J]. 量子电子学报, 2010,27(1):41-46.[3]Sun X M, Zha X W, Qi J X, Lan Q. High-efficient quantum state sharing via non-maximally five-qubit cluster state[J]. Acta Physical Sinica(物理学报),2013,62(23): 230302-230310 (in Chinese).孙新梅,查新未,祁建,霞兰倩.基于非最大纠缠的五粒子Cluster 态的高效量子态共享方案[J]. 物理学报,2013,62(23): 230302-230310.[4]Hillery M, Buzek V, Berthiaume A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3): 1829-1834.[5]Karlsson A, Koashi M, Imoto N. Quantum entanglement for secret sharing and secret splitting [J]. Physical Review A, 1999,59(1):162-168.[6]Xiao L, Long G L, Deng F G, et al.. Efficient multiparty quantum-secret-sharing schemes[J]. Physical Review A, 2004,69(5): 052307-052311.[7]Schmid C, Trojek P, Bourennane M, et al.. Experimental Single Qubit Quantum Secret Sharing[J]. Physical Review Letters, 2005, 95(23):230505-230508.[8]Liu L L, Tsai C W, Hwang T. Quantum Secret Sharing Using Symmetric W State[J]. International Journal of Theoretical Physics, 2012, 51:2291–2306.[9]Shih H C, Lee K C, Hwang T. New Efficient Three-Party Quantum Key Distribution Protocols[J]. IEEE Journal of Selected Topics in Quantum Electronics, 2009, 15(6):1602-1606.[10]Zhao S M, Zheng B Y.Quantum information Processing Techniques [M]. Beijing:Posts and telecommunications Press, 2010:14-19、52-54(in Chinese). 赵生妹,郑宝玉. 量子信息处理技术[M]. 北京:北京邮电大学出版社,2010:14-19、52-54.[11]Gao F, Qin S J, Guo F Z, et al.. Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols[J]. IEEE Journal of Quantum Electronics, 2011, 47(5):630-635.[12]Zhao S M, Li M M, Zheng B Y. A Novel Quantum Key Distribution Protocol Based on Quantum Error Correction Code[J]. Journal of Electronics & Information Technology(电子与信息学报), 2009,31(4):954-957(in Chinese).赵生妹,李苗苗,郑宝玉. 一种基于量子纠错编码的量子密钥分配协议[J].电子与信息学报,2009,31(4):954-957.[13]Zhao S M, Zhu X L, Xiao Y. A Novel Construction of Quantum LDPC Codes Based on Balanced Incomplete Block Designs[J]. Journal of Electronics & Information Technology(电子与信息学报), 2011,33(1):218-222(in Chinese).赵生妹,朱修利,肖宇. 一种基于 BIBD 的量子LDPC 码构造新方法[J].电子与信息学报,2011,33(1):218-222.[14]Lin J, Yang C W, Tsai C W, et al.. Intercept-Resend Attacks on Semi-quantum Secret Sharing and the Improvements[J]. International Journal of Theoretical Physics,2013,52:156–162.[15]Qin S J, Gao F, Guo F Z, et al.. Comment on “Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair”[J]. Physical Review A, 2010,82(3): 036301- 036303.[16]Song T T, Wen Q Y, Gao F, et al.. Participant Attack and Improvement to Multiparty Quantum Secret Sharing Based on GHZ States[J]. International Journal of Theoretical Physics, 2013, 52:293–301.[17]Deng F G, Li X H, Zhou H Y, et al.. Improving the security of multiparty quantum secret sharing against Trojan horse attack[J]. Physical Review A, 2005, 72 (4): 044302-044305.[18]Yang Y G, Jia X, Xia J, et al.. Comment on “Quantum Secure Direct Communication with Authentication Expansion Using Single Photons”[J]. International Journal of Theoretical Physics, 2012, 51:3681–3687. |