[1] 范琏. 量子秘密共享理论研究. 国防科学技术大学硕士论文. 2007年.
[2] Tong Xin, Wen Qiaoyan, Zhu Fuchen. Quantum secret sharing based on GHZ state entanglement swaping [J]. Journal of Beijing University of Post and Telecommunications, 2007, 30(1):44-48.
[3] Hillery M, Buzek V, Berthiaume A. Quantum secret sharing [J], Phys Rev A, 1999, 59:1829.
[4] 张天鹏. 量子安全直接通信及QTDMC技术研究. 西安电子科技大学硕士论文. 2009年
[4] Zhang Tianpeng. Reaserch on Quantum Secure Direct Communication and Quantum Time Division Multiuser Communication[D]. Journal of Xidian University, 2009, 27-40.
[5] Liu Linyao, Xie Guangjun, et al. Quantum key distribution protocol based on any Bell states [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2013, 30(4): 440-444.
[6] Wu Zhangbin, Chen Guang, et al. Improvement of performance distribution of BBM92 quantum key system [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2009, 26(5): 560-564.
[7] Zhu Aidong, Zhang Shou. Quantum key distribution and controlled quantum direct communication applying product state of qutrit [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2007, 24(3): 316.
[8] Tao Yuan, Pan Wei, Luo bin, et al. A scheme for quantum key distribution between any two uses in a network via W state [J]. Journal of Electronics and Information Technology(电子与信息学报),2008, 30, 2588-2591.
[9] Zhou Yuanyuan, Li Xiaoqiang, Zhou Xuejun. BB84-decoy-state quantum key distribution with a heralded signal photon source [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2010, 27(5): 565-572
[10] Zhao Long, Cao Zhengwen, et al. Multi-signature scheme based on quantum properties [J]. Chinese Journal of Quantum Electronics(量子电子学报),2012,29(1): 69-73.
[11] Dusek M, Haderka O, Hendrych M, et al. Quantum identification system. Physical Review A,1999,(60):149
[12] 王立军. 量子确定性密钥分发及其信息论分析. 南昌大学硕士论文. 2010.
[12] Wang Lijun. Quantum Deterministic Key Distribution and Its Information-theoretical Analyses[D]. Nanchang University, 2010, 1-60.
[13] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel[J]. Physica Scripta, 2010,81(4):045009.
[14] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Novel quantum deterministic key distribution protocols with entangled states[J]. International Journal of Theoretical Physics, 2010,49(9):2035~2044.
[15] Nanrun Zhou, Lijun Wang, Jie Ding, et al. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping[J]. Journal of Physics B, 2010,59(4):2193~2199.
[16] Nanrun Zhou, Xiawen Xiao, Lijun Wang, et al. Determinant quantum key distribution via entanglement swapping[C]. In Proceedings of International Symposium on Computer Science and Computarional Technology. China: Huangshan, 2009:365~368.
[17] Zhang Zhao, Ma Zhi. Quantum protocol based on W state and Bell state[J]. Journal of Information Engineering University. 2013, 14(3):263-268.
[18] Cabello A. Quantum key distribution in the Holevo Limit [J]. Phys. Rev. Lett.,2000,85(26):5635-5638. |