[1] 范琏. 量子秘密共享理论研究. 国防科学技术大学硕士论文. 2007年.[2] 张天鹏. 量子安全直接通信及QTDMC技术研究. 西安电子科技大学硕士论文. 2009年[3] Liu Linyao, Xie Guangjun, et al. Quantum key distribution protocol based on any Bell states [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2013, 30(4): 440-444.[4] 黄大足. 量子安全通信理论及方案研究. 中南大学博士论文. 2010年.[5] 杜建忠. 量子安全通信若干问题的研究. 北京邮电大学博士论文. 2007年.[6] Dusek M, Haderka O, Hendrych M, et al. Quantum identification system. Physical Review A,1999,(60):149[7] 王立军. 量子确定性密钥分发及其信息论分析. 南昌大学硕士论文. 2010.[8] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel[J]. Physica Scripta, 2010,81(4):045009.[9] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Novel quantum deterministic key distribution protocols with entangled states[J]. International Journal of Theoretical Physics, 2010,49(9):2035~2044.[10] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping[J]. Journal of Physics B, 2010,59(4):2193~2199.[11] Nanrun Zhou, Xiawen Xiao, Lijun Wang, et al. Determinant quantum key distribution via entanglement swapping[C]. In Proceedings of International Symposium on Computer Science and Computarional Technology. China: Huangshan, 2009:365~368.[12] Nielsen M A, Chuang I L 著. 郑大中,赵千川译,量子计算和量子信息——量子信息部分. 北京:清华大学出版社,2005.[13] Tong Xin, Wen Qiaoyan, Zhu Fuchen. Quantum secret sharing based on GHZ state entanglement swaping [J]. Journal of Beijing University of Post and Telecommunications, 2007, 30(1):44-48.[14] 温巧燕,郭奋卓,朱甫臣等著,量子保密通信协议的设计与分析. 北京:科学出版社,2009.[15] Cai Q Y. Eavesdropping on the two-way quantum communication protocols with invisible photons[J]. Phys. Lett. A. 2006,351:23.[16] Chiribella G, Maccone L, Perinotti P. Secret quantum communication of a reference frame. Physical Review Letters, 2007, (98):120501.[17] Cabello A. Quantum key distribution in the Holevo Limit [J]. Phys. Rev. Lett.,2000,85(26):5635-5638. |