[1] Bennett C H, Brassard G, Mermin N D. Quantum Cryptography without Bells Theorem[J]. Physical Review Letter, 1992, 68: 557- 569. [2] Hillery M, Buzek V, Berthiaume A. Quantum Secret Sharing[J]. Physical Review A, 1999, 59: 1829-1834. [3] 林青群, 王发强, 米景隆, 等, 基于随机相位编码的确定性量子密钥分配[J]. 物理学报,2007,56: 5796-5801. [4] 陶原, 潘炜, 罗斌, 等. 基于W态的网络中任意两个用户间量子密钥分配方案[J]. 电子与信息学报, 2008, 30: 2588-2591. [5] Zhu Aidong, Zhang Shou. Quantum key distribution and controlled quantum direct communication applying product state of qutrit [ J]. Chinese Journal of Quantum Electronics(量子电子学报), 2007,24(3) : 316(in Chinese). [6] LEE H, HONG C, K IM H, et al. Arbitrated Quantum Signature Scheme With message Recovery [ J]. Physical Review A, 2004, 321: 295-300. [7] Zhou N R, Zeng G H, Zeng W J, et al. Cross-center quantum identification scheme based on teleportation and entanglement swapping. Optics Communications, 2005, 254: 380—388. [8] Bostrom K, Felbinger T. Deterministic Secure Direct Communication Using Entanglement[J]. Physical Review Letter, 2002, 89: 187902. [9] Wang J, Zhang Q, Tang C J. Quantum Secure Direct Communication Based on Order Rearrangement of Single Photons[J]. Physical Review A, 2006,358: 256-258. [10] Wang J, Zhang Q, Tang C J. Multiparty Controlled Quantum Secure Direct Communication Using Greenberger-Horne-Zeilinger State[J].Optics Communications, 2006, 266: 732- 737. [11] 龙桂鲁,王川,李岩松,邓富国. 量子安全直接通信[J]. 中国科学,2011,41: 332-342. [12] Ji Xin, Zhang Shou. Teleportation of the there-particle entangled state by the two EPR pairs [J]. Chinese Journal of Quantum Electronics(量子电子学报), 2006,23(6) : 816(in Chinese). [13] Bennet C H, Brassard G.. Quantum cryptography: Public-key distribution and tossing[C]// IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 1984. [14] Bennett C H. Quantum cryptography using any two nonorthogonal states[J].Physical Review Letters, 1992, 68: 3121-3124. [15] EKERT A K. Quantum cryptography based on B ell. s theorem [J].Physical Review Letters, 1991, 67: 66663. [16] BRUB D. Optimal Eavesdropping in Quantum Cryptography with SixStates[J].Physical Review Letters, 1998, 81: 3108-3021. [17] SONG D. Secure key distribution by swapping quantum entanglement[J].Physical Review A, 2004, 69: 034301. [18] 张德喜,赵秋宇,李晓宇.利用贝尔测量的高效量子密钥分配协议[J].电子科技大学学报,2006,35:917-923. [19] GAO G.. Quantum key distribution by comparing Bell states [J].2008, 281: 876-879. [20] YUAN H, SONG J, HAN L F, et al. Improving the total efficiency of quantum key distribution by comparing Bell states [J]. Optics Communication, 2008, 281: 4803- 4806. [21] Nanrun Z, Li J W, LI H G, Xiang W Z, Ye L. Quantum deterministic key distribution protocols based on teleportation and entanglement swapping[J]. Optics Communications, 2011,284: 4836–4842. [22] Cinelli C, Barbieri M, Martini F D, et al. Realization of hyperentangled two-photon states[J]. International Journal of Laser Physics, 2005,15:124-128.
|